General
-
Target
main.rar
-
Size
7.4MB
-
Sample
241010-2makcswbkp
-
MD5
08b6ccf2d788b4c28e67ba2695305299
-
SHA1
8996495ccccf11ceb1d806f3fbfd217fdc4bf66d
-
SHA256
1617e37bcd27307fa0992c8865eb91d8ef4d7a642132abe74ea5b46af7f648bd
-
SHA512
b5fa0abae595859551213fff4c8babb8b87dbe6f9045a7a9b98305cb3e94ddf23ba055e41f94db801aef62043ae41e9e8774bbb6e162b864bf13094eb4e6576f
-
SSDEEP
196608:ZHdfBJvZq5S9Mx1avNODvVzfcQSWsiBk3q9K5a1psjHjq0z:ZbJxq5xwdQSWtHKYqbjz
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
Loader.exe
-
Size
7.5MB
-
MD5
598f72402d65a23e0d3cf3b62dc7f8d8
-
SHA1
4171fce35a5add0b3036ff9fb9ef3ef5961d7b81
-
SHA256
1904a9b7fcab0323088596c84e47f11d4f9c1852ba32790be46886efe9f43cc8
-
SHA512
8cb8a8bd72884d89e0907b090bb39f9f784509c7f6ee2c5912985fe0c253d0db031e40abeb65d0a277fde7b508795dfb81782f43434eb4234250f9d677e28c80
-
SSDEEP
196608:DqunqZkwfI9jUC2XMvH8zPjweaBpZ0cX2ooccXK7oSm:FeIH2XgHq+jq93YoH
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Enumerates processes with tasklist
-