General
-
Target
NeggyOnTop.exe
-
Size
7.4MB
-
Sample
241009-hktqnszfrm
-
MD5
188c9f83383d23497f1a601b697a6344
-
SHA1
bfa3b440e130523ae41154c399830eb3e0e8f353
-
SHA256
0a74464ae44325751b528704e9ac6ff6b423085c5a509f9739a336325c9b9812
-
SHA512
b3ed1f33ac543f1b22fad5d1aeb402a0822f2d3c83be80d1d6f25eb7f14ddf424ea0abfc65c0595eaed4998b6782cee4fe37e2b737e59f0b35f334db131076f8
-
SSDEEP
196608:Vrcd0cDecLjv+bhqNVoBKUh8mz4Iv9Plu1D7AP:TieML+9qz8/b4IzuRAP
Behavioral task
behavioral1
Sample
NeggyOnTop.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
NeggyOnTop.exe
-
Size
7.4MB
-
MD5
188c9f83383d23497f1a601b697a6344
-
SHA1
bfa3b440e130523ae41154c399830eb3e0e8f353
-
SHA256
0a74464ae44325751b528704e9ac6ff6b423085c5a509f9739a336325c9b9812
-
SHA512
b3ed1f33ac543f1b22fad5d1aeb402a0822f2d3c83be80d1d6f25eb7f14ddf424ea0abfc65c0595eaed4998b6782cee4fe37e2b737e59f0b35f334db131076f8
-
SSDEEP
196608:Vrcd0cDecLjv+bhqNVoBKUh8mz4Iv9Plu1D7AP:TieML+9qz8/b4IzuRAP
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-