General
-
Target
Built.exe
-
Size
7.6MB
-
Sample
241007-x9nnaasbjq
-
MD5
558d8f6b08261037e237f3b099f67755
-
SHA1
1f028068df666647755231d4cae1d339743dbf11
-
SHA256
ce9f90aecafd2cdd0fca756573f3d3e9b8a4bcbdeccd15a7d98e5139d21d0420
-
SHA512
c899e545fcc3db015c66cfbeb67efddaf0b0dc1b596a6edb2a1b53ff86967a8dd25fd51811406794b672d4c0f46c929288411fad3300c16c1b95dd5c3e1ffc03
-
SSDEEP
196608:Nl6HYvwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jN:DKIHziK1piXLGVE4Ue0VJB
Behavioral task
behavioral1
Sample
Built.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
Built.exe
-
Size
7.6MB
-
MD5
558d8f6b08261037e237f3b099f67755
-
SHA1
1f028068df666647755231d4cae1d339743dbf11
-
SHA256
ce9f90aecafd2cdd0fca756573f3d3e9b8a4bcbdeccd15a7d98e5139d21d0420
-
SHA512
c899e545fcc3db015c66cfbeb67efddaf0b0dc1b596a6edb2a1b53ff86967a8dd25fd51811406794b672d4c0f46c929288411fad3300c16c1b95dd5c3e1ffc03
-
SSDEEP
196608:Nl6HYvwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jN:DKIHziK1piXLGVE4Ue0VJB
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-