General
-
Target
b979e615d929942a9548de186973fef31cd73a25a5f11af8c0175630055abfa1N
-
Size
7.6MB
-
Sample
241010-yln5ksygln
-
MD5
5b4fdf5480a5154079b5b40100e19ac0
-
SHA1
b845db6ce615ef488e50bf68017374cbc555d4cd
-
SHA256
b979e615d929942a9548de186973fef31cd73a25a5f11af8c0175630055abfa1
-
SHA512
407de7c958952894cf58ff38cd28126faa63ae923860bd64a69cca8621537ee43037c417b6ae065a1e20b4cdef6adec4fdb425d16b2c266511de7b6e4d1eabbb
-
SSDEEP
196608:BzgVVEPwfI9jUC2gYBYv3vbW2+iITx1U6ny:WVVEEIH2gYBgDWJTnzy
Behavioral task
behavioral1
Sample
b979e615d929942a9548de186973fef31cd73a25a5f11af8c0175630055abfa1N.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
b979e615d929942a9548de186973fef31cd73a25a5f11af8c0175630055abfa1N
-
Size
7.6MB
-
MD5
5b4fdf5480a5154079b5b40100e19ac0
-
SHA1
b845db6ce615ef488e50bf68017374cbc555d4cd
-
SHA256
b979e615d929942a9548de186973fef31cd73a25a5f11af8c0175630055abfa1
-
SHA512
407de7c958952894cf58ff38cd28126faa63ae923860bd64a69cca8621537ee43037c417b6ae065a1e20b4cdef6adec4fdb425d16b2c266511de7b6e4d1eabbb
-
SSDEEP
196608:BzgVVEPwfI9jUC2gYBYv3vbW2+iITx1U6ny:WVVEEIH2gYBgDWJTnzy
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-