General
-
Target
MEMXRY CHEAT.exe
-
Size
8.2MB
-
Sample
241009-3shzcs1fmd
-
MD5
0313c9bf58936603623106b6029af126
-
SHA1
a2b158002a20648b57816ae40bb32abdb5bac7bd
-
SHA256
6b7eb87c65c4c02ff513f8d317f637ee1117fc6fff3fff81901cf1bf488e5c3c
-
SHA512
cb3347fe1ffaa2d0d1e764b8a0693a3fca71b2f06b36f10dc03e6e6634e198dc883beb50828fbafddc0af429a1325f8b427299a403b875737e3efe242ffcb4d6
-
SSDEEP
196608:0mWB5urErvI9pWjg/Qc+4o673pNrabebSEdyzWGPMYnN9sU:u5urEUWjZZ4dDLIeW7zWGPTNCU
Behavioral task
behavioral1
Sample
MEMXRY CHEAT.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
MEMXRY CHEAT.exe
-
Size
8.2MB
-
MD5
0313c9bf58936603623106b6029af126
-
SHA1
a2b158002a20648b57816ae40bb32abdb5bac7bd
-
SHA256
6b7eb87c65c4c02ff513f8d317f637ee1117fc6fff3fff81901cf1bf488e5c3c
-
SHA512
cb3347fe1ffaa2d0d1e764b8a0693a3fca71b2f06b36f10dc03e6e6634e198dc883beb50828fbafddc0af429a1325f8b427299a403b875737e3efe242ffcb4d6
-
SSDEEP
196608:0mWB5urErvI9pWjg/Qc+4o673pNrabebSEdyzWGPMYnN9sU:u5urEUWjZZ4dDLIeW7zWGPTNCU
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-