General
-
Target
Built.exe
-
Size
8.1MB
-
Sample
241011-yq2lgawajk
-
MD5
dea92df26c91ee8b788fd3992f9654b5
-
SHA1
f5d0b4e1d01678b03c08af87ae08519b0989a980
-
SHA256
b93d5ffde1846f8cec2a224af03e6f155ae236279273ca7425e7493f896b8853
-
SHA512
ba5cec1a256cd63953819521f8f3cd186986fae0d8abe2dc8adf6429bb784ed092a64e70cb64b52f1bcbc73612dbad58b44b3ab005476b89b1d4d8e6221c088c
-
SSDEEP
196608:wXY365XtOshoKMuIkhVastRL5Di3unSE51D7w:sY3COshouIkPftRL54XCRw
Behavioral task
behavioral1
Sample
Built.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
Built.exe
-
Size
8.1MB
-
MD5
dea92df26c91ee8b788fd3992f9654b5
-
SHA1
f5d0b4e1d01678b03c08af87ae08519b0989a980
-
SHA256
b93d5ffde1846f8cec2a224af03e6f155ae236279273ca7425e7493f896b8853
-
SHA512
ba5cec1a256cd63953819521f8f3cd186986fae0d8abe2dc8adf6429bb784ed092a64e70cb64b52f1bcbc73612dbad58b44b3ab005476b89b1d4d8e6221c088c
-
SSDEEP
196608:wXY365XtOshoKMuIkhVastRL5Di3unSE51D7w:sY3COshouIkPftRL54XCRw
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-