General
-
Target
Loader.exe
-
Size
7.5MB
-
Sample
241008-1cv8msseqf
-
MD5
a2e2fee9416621f7836fe974e9107232
-
SHA1
3bb30b7a1a15792a1de5ce20668df7e4d0f2aea0
-
SHA256
9953603e5389576a759aae68d38a8b766cb6c1199116712f79de7400367b98d3
-
SHA512
507486497d44db41d36f2e087fa073f49590203543371f97cfc24a5d29d53d6909651fc634fc56578b729dade445dc93270ee5e7c3ef127176e279deade54942
-
SSDEEP
196608:T3unqZGwfI9jUC2XMvH8zPjweaBpZ0cX2ooccXK7oSb:aKIH2XgHq+jq93YoO
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
Loader.exe
-
Size
7.5MB
-
MD5
a2e2fee9416621f7836fe974e9107232
-
SHA1
3bb30b7a1a15792a1de5ce20668df7e4d0f2aea0
-
SHA256
9953603e5389576a759aae68d38a8b766cb6c1199116712f79de7400367b98d3
-
SHA512
507486497d44db41d36f2e087fa073f49590203543371f97cfc24a5d29d53d6909651fc634fc56578b729dade445dc93270ee5e7c3ef127176e279deade54942
-
SSDEEP
196608:T3unqZGwfI9jUC2XMvH8zPjweaBpZ0cX2ooccXK7oSb:aKIH2XgHq+jq93YoO
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-