General
-
Target
Blank_grabber.exe
-
Size
7.5MB
-
Sample
241012-t1y6wathnp
-
MD5
a87b075468e0adddb4e9bf7dfc4a9d3f
-
SHA1
37aafeb89ece8170a9c97ab0beccdeb77d992b82
-
SHA256
7ae9f50002ad8be6a792c9474d1f76273d0c8dd9c569d685f72e5eff33bc47fb
-
SHA512
0316bad04047bba56c90984a2635878f4d78d6c996b8f317705cd20f64ac45911fd5ebaef387ee55049852e2811373a048d736353f45bd805505be537b1880ad
-
SSDEEP
196608:aggVVE6/YwfI9jUC2gYBYv3vbW2+iITx1U6n+:0VVEgIH2gYBgDWJTnz+
Malware Config
Targets
-
-
Target
Blank_grabber.exe
-
Size
7.5MB
-
MD5
a87b075468e0adddb4e9bf7dfc4a9d3f
-
SHA1
37aafeb89ece8170a9c97ab0beccdeb77d992b82
-
SHA256
7ae9f50002ad8be6a792c9474d1f76273d0c8dd9c569d685f72e5eff33bc47fb
-
SHA512
0316bad04047bba56c90984a2635878f4d78d6c996b8f317705cd20f64ac45911fd5ebaef387ee55049852e2811373a048d736353f45bd805505be537b1880ad
-
SSDEEP
196608:aggVVE6/YwfI9jUC2gYBYv3vbW2+iITx1U6n+:0VVEgIH2gYBgDWJTnz+
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-