General
-
Target
Crubby-SetUp.exe
-
Size
7.6MB
-
Sample
241011-p8gjkstbng
-
MD5
e9af544eb8111fd21728de67e4f326d8
-
SHA1
bfaa8586a473265f291e9bb226af4680edfbe64e
-
SHA256
e14419534d79ebd665a8680bb8a37d7aa9c62804aaa1c14d72303ec1c865e0fa
-
SHA512
2745c59d4bf07313493198d6fb6578bbcc2a6c40d98fe4de78e0af3b93247d083a376136b7cb6564fd1e971ca33d2c8deb5510d9f640d8da00526b72df092e24
-
SSDEEP
98304:AqH+ImMcr/urErvz81LpWjjUlLkvzgXO9hAlaYrzzuJZYJ1JIuI/KU73bcgVowjf:AqsurErvI9pWjgyvoaYrE41JIuICox3
Behavioral task
behavioral1
Sample
Crubby-SetUp.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
Crubby-SetUp.exe
-
Size
7.6MB
-
MD5
e9af544eb8111fd21728de67e4f326d8
-
SHA1
bfaa8586a473265f291e9bb226af4680edfbe64e
-
SHA256
e14419534d79ebd665a8680bb8a37d7aa9c62804aaa1c14d72303ec1c865e0fa
-
SHA512
2745c59d4bf07313493198d6fb6578bbcc2a6c40d98fe4de78e0af3b93247d083a376136b7cb6564fd1e971ca33d2c8deb5510d9f640d8da00526b72df092e24
-
SSDEEP
98304:AqH+ImMcr/urErvz81LpWjjUlLkvzgXO9hAlaYrzzuJZYJ1JIuI/KU73bcgVowjf:AqsurErvI9pWjgyvoaYrE41JIuICox3
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-