General
-
Target
Built.exe
-
Size
8.2MB
-
Sample
241012-1t3ztatckh
-
MD5
83c4ad1e91db58733cdd1f20424a086e
-
SHA1
88b17e14f47f605d01b07db703666259389dc313
-
SHA256
8e24dc229f3ff2d3d94d43d216a2de3f24a0b55fd624cea0c9c45d4b12a257f3
-
SHA512
3891e37da2937ec9c1b7905a3d3a6b797e4b9b04f8351d1095f3eef3818272f3d8775f488388ca6b8d66d75feb8550ce2cfe64cfc148a65a8491823c57626ffc
-
SSDEEP
196608:jP/Y8BVOA0j2urErvI9pWjgfPvzm6gsWLqERnX:j1O16urEUWjC3zDwWm
Malware Config
Targets
-
-
Target
Built.exe
-
Size
8.2MB
-
MD5
83c4ad1e91db58733cdd1f20424a086e
-
SHA1
88b17e14f47f605d01b07db703666259389dc313
-
SHA256
8e24dc229f3ff2d3d94d43d216a2de3f24a0b55fd624cea0c9c45d4b12a257f3
-
SHA512
3891e37da2937ec9c1b7905a3d3a6b797e4b9b04f8351d1095f3eef3818272f3d8775f488388ca6b8d66d75feb8550ce2cfe64cfc148a65a8491823c57626ffc
-
SSDEEP
196608:jP/Y8BVOA0j2urErvI9pWjgfPvzm6gsWLqERnX:j1O16urEUWjC3zDwWm
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-