General
-
Target
Built.exe
-
Size
7.7MB
-
Sample
241012-y7gmmatfjj
-
MD5
c0dcfdc545083c0a4ae97f25be5a3223
-
SHA1
1d62e51d31cfe2b71216ce9c99f12887dc497f5d
-
SHA256
c1dcb83a8707fb1b49c181ffedca403928fc00df6f209ff3db8117fd00b29ef4
-
SHA512
41a9d68c7ec47b5aabcfb07c5a4df24405201560b1d38f4d3ba4b01b5d6359f4878fbe76f0d10b6554d8cc43324239e0e4583c377f336dd7bb600b68b253a4ba
-
SSDEEP
196608:Vi0D3eNTfm/pf+xk4dNSESRptrbWOjgrJ:JEy/pWu4m5RptrbvMrJ
Malware Config
Targets
-
-
Target
Built.exe
-
Size
7.7MB
-
MD5
c0dcfdc545083c0a4ae97f25be5a3223
-
SHA1
1d62e51d31cfe2b71216ce9c99f12887dc497f5d
-
SHA256
c1dcb83a8707fb1b49c181ffedca403928fc00df6f209ff3db8117fd00b29ef4
-
SHA512
41a9d68c7ec47b5aabcfb07c5a4df24405201560b1d38f4d3ba4b01b5d6359f4878fbe76f0d10b6554d8cc43324239e0e4583c377f336dd7bb600b68b253a4ba
-
SSDEEP
196608:Vi0D3eNTfm/pf+xk4dNSESRptrbWOjgrJ:JEy/pWu4m5RptrbvMrJ
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-