General
-
Target
Loader.exe
-
Size
7.5MB
-
Sample
241009-cqgqeaxfmh
-
MD5
544002c4428a25cd94b0c4350e0b591d
-
SHA1
8834d40cb58bdd2b511821ab59b78aecb5565686
-
SHA256
1b6ecf8e755bb6dda1e1671555ffa659fb881205a59b1b916e0e934efc0ba6e4
-
SHA512
20866a8aee4bc5f860f744df3f1fb8bf0c6ddd21cb539b08e26cef58895b0d0166e29bd284fb4b3ad0b1e52f52e560bcd29a1df761a3d7f4e8fcf88328001ae0
-
SSDEEP
196608:rFunqZVGwfI9jUC2XMvH8zPjweaBpZ0cX2ooccXK7oSp:sYtIH2XgHq+jq93Yog
Malware Config
Targets
-
-
Target
Loader.exe
-
Size
7.5MB
-
MD5
544002c4428a25cd94b0c4350e0b591d
-
SHA1
8834d40cb58bdd2b511821ab59b78aecb5565686
-
SHA256
1b6ecf8e755bb6dda1e1671555ffa659fb881205a59b1b916e0e934efc0ba6e4
-
SHA512
20866a8aee4bc5f860f744df3f1fb8bf0c6ddd21cb539b08e26cef58895b0d0166e29bd284fb4b3ad0b1e52f52e560bcd29a1df761a3d7f4e8fcf88328001ae0
-
SSDEEP
196608:rFunqZVGwfI9jUC2XMvH8zPjweaBpZ0cX2ooccXK7oSp:sYtIH2XgHq+jq93Yog
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-