General
-
Target
hitboxy fivem 2024.exe
-
Size
10.0MB
-
Sample
241010-hqwr8azhjb
-
MD5
dc6b9eaa417ac380895dfd554c0ff29d
-
SHA1
3976703a1e78d1445f72a528f4869e294eeea8e3
-
SHA256
850784d54367cf719db3a75e899588cd9a299ab42da80dfa2a19f670d234dc65
-
SHA512
737813ca5440888a7c222ef56de8f4f9dd99237d29c5f78d44c073752a555da8f5c6e2df9969d86e0f794303c1d1035ed1a834bcace0635651c0cd33e969afeb
-
SSDEEP
196608:LAumWeLNOjmFwDRxtYSHdK34kdai7bN3m2q4l6:7gYK2pM9B3Qrr
Behavioral task
behavioral1
Sample
hitboxy fivem 2024.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
hitboxy fivem 2024.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
�u-�U��.pyc
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
�u-�U��.pyc
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
hitboxy fivem 2024.exe
-
Size
10.0MB
-
MD5
dc6b9eaa417ac380895dfd554c0ff29d
-
SHA1
3976703a1e78d1445f72a528f4869e294eeea8e3
-
SHA256
850784d54367cf719db3a75e899588cd9a299ab42da80dfa2a19f670d234dc65
-
SHA512
737813ca5440888a7c222ef56de8f4f9dd99237d29c5f78d44c073752a555da8f5c6e2df9969d86e0f794303c1d1035ed1a834bcace0635651c0cd33e969afeb
-
SSDEEP
196608:LAumWeLNOjmFwDRxtYSHdK34kdai7bN3m2q4l6:7gYK2pM9B3Qrr
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
-
-
Target
�u-�U��.pyc
-
Size
857B
-
MD5
7928c58dc860f84b2da3da2250ce8bf9
-
SHA1
45d307d65d8c3862187ae6dd0178ab3b98a9d476
-
SHA256
c1c3472776646d9223eb05d230a6a3ab02901c5b4e8a49b31a3e0526deef8e2a
-
SHA512
8bdd3ba4391ba682f76707a7fc2bd57a3ff8f06cc9b4d37b88aa5ddc4e3bdd0268bb35a21b377ca70e5f15c48ba7880242cb5a806cb5b81613092fd1350d4b2c
Score1/10 -