General
-
Target
Built.exe
-
Size
7.5MB
-
Sample
241012-26nw4awgng
-
MD5
4faed207c50d4b3ef6aabdac60bdda2c
-
SHA1
fc111cca12c342ffb2e56150ee68b01b41b6e8ed
-
SHA256
0d46311d4b5b20746fbeaeb16f00ef265c254fa6f81b564640c015232f83252e
-
SHA512
5dbd6959bde2caf57c49fad80972a9117208c2da00cdd0a7a74d00348e3a41076bc92626e49d0e3bd59476b1ef21b73dbd967a3e15a6e1535b29a8384690c0de
-
SSDEEP
196608:owhBGurErvI9pWjg/Qc+4o673pNrabenyzWGPMYnN9si:ZGurEUWjZZ4dDLIeyzWGPTNCi
Behavioral task
behavioral1
Sample
Built.exe
Resource
win11-20241007-it
Behavioral task
behavioral2
Sample
��U�z.pyc
Resource
win11-20241007-it
Malware Config
Targets
-
-
Target
Built.exe
-
Size
7.5MB
-
MD5
4faed207c50d4b3ef6aabdac60bdda2c
-
SHA1
fc111cca12c342ffb2e56150ee68b01b41b6e8ed
-
SHA256
0d46311d4b5b20746fbeaeb16f00ef265c254fa6f81b564640c015232f83252e
-
SHA512
5dbd6959bde2caf57c49fad80972a9117208c2da00cdd0a7a74d00348e3a41076bc92626e49d0e3bd59476b1ef21b73dbd967a3e15a6e1535b29a8384690c0de
-
SSDEEP
196608:owhBGurErvI9pWjg/Qc+4o673pNrabenyzWGPMYnN9si:ZGurEUWjZZ4dDLIeyzWGPTNCi
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
-
-
Target
��U�z.pyc
-
Size
1KB
-
MD5
417ca489e02f0293b714068b4aa5bb09
-
SHA1
2790b2f64b99fafdd009b31f954f12eae9c609bc
-
SHA256
369527f48f62c720abdf109cdcd4d21bc21f487c3af6a3cb78902284b1cfe8a8
-
SHA512
e57066ada6541565d7b0a8c86a203b3e40a8031a0b497d4a0bae386e3269e18d64bc3468d208cc2cdad92bf52d14e7d21d5b4aab574ce48ab5c3f7578005c800
Score1/10 -