General
-
Target
osuhack.exe
-
Size
8.2MB
-
Sample
241012-tl51wayfkb
-
MD5
e8d93965e67837d3b69b702fccd2f1b4
-
SHA1
668e40b70a160286b9fef7928e358f6d2af496f2
-
SHA256
4c6c67abcd02db5d53b3adca370958ec38c6b98ab653788fa7b7662f40108c74
-
SHA512
2c8f16749f4d63afdef0b40bd2c329870ff1ba1075a62dad079bd89a9644b98f2d4083ea6d763052393494fe41e2ae4aab8fb3e02adfeb3c4ca8fb39269401f4
-
SSDEEP
196608:mkQXwuLbkurErvI9pWjgN3ZdahF0pbH1AYSEp7CtQsNI/Sx3C1+:/jurEUWjqeWxQR6nAY+
Malware Config
Targets
-
-
Target
osuhack.exe
-
Size
8.2MB
-
MD5
e8d93965e67837d3b69b702fccd2f1b4
-
SHA1
668e40b70a160286b9fef7928e358f6d2af496f2
-
SHA256
4c6c67abcd02db5d53b3adca370958ec38c6b98ab653788fa7b7662f40108c74
-
SHA512
2c8f16749f4d63afdef0b40bd2c329870ff1ba1075a62dad079bd89a9644b98f2d4083ea6d763052393494fe41e2ae4aab8fb3e02adfeb3c4ca8fb39269401f4
-
SSDEEP
196608:mkQXwuLbkurErvI9pWjgN3ZdahF0pbH1AYSEp7CtQsNI/Sx3C1+:/jurEUWjqeWxQR6nAY+
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-