General
-
Target
Built.exe
-
Size
8.1MB
-
Sample
241011-yv16hawcjp
-
MD5
50860f75ff5dc4735ee30eace0f6b181
-
SHA1
da63a7a481053ec1dfbe27ec9735267ff90fb745
-
SHA256
44f1f7288b94669d3d8632fb30c268814888247714eb62c8293d09623c2d8c36
-
SHA512
ab980ec0a06efa327e0765e9022ce24ba783d347c6aec84c003220f17569096ebe652d95f74e78cacf551b81d7c1e42d9b87b9a6e41f30f92ed572915bc8c3df
-
SSDEEP
196608:uyY36GzOshoKMuIkhVastRL5Di3unSE51D7i:5Y3vzOshouIkPftRL54XCRi
Behavioral task
behavioral1
Sample
Built.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Built.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Built.exe
-
Size
8.1MB
-
MD5
50860f75ff5dc4735ee30eace0f6b181
-
SHA1
da63a7a481053ec1dfbe27ec9735267ff90fb745
-
SHA256
44f1f7288b94669d3d8632fb30c268814888247714eb62c8293d09623c2d8c36
-
SHA512
ab980ec0a06efa327e0765e9022ce24ba783d347c6aec84c003220f17569096ebe652d95f74e78cacf551b81d7c1e42d9b87b9a6e41f30f92ed572915bc8c3df
-
SSDEEP
196608:uyY36GzOshoKMuIkhVastRL5Di3unSE51D7i:5Y3vzOshouIkPftRL54XCRi
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1