General
-
Target
Built.exe
-
Size
10.0MB
-
Sample
241013-2effms1hrb
-
MD5
e3f0a3248b2084fe1ab9a11ce10fe3c5
-
SHA1
e15f23f2e1981062318ebc384d11af8e015ade10
-
SHA256
97a01eea8c647df06b278b0651de28bb60f615da3fc00ef2e08a363b3fd33770
-
SHA512
f6662bcf47dbaecff36aaddc2da0ee41d6f1c07fe2e3591fef5db6c2f3123d3857577d66834801b5d94a7d577294a3ef654b200992ba2dd528f50a218b7c8fdb
-
SSDEEP
196608:WjFbeyAeN/FJMIDJf0gsAGK5SEQRzuAKw9RW:iv/Fqyf0gsfNiAKJ
Malware Config
Targets
-
-
Target
Built.exe
-
Size
10.0MB
-
MD5
e3f0a3248b2084fe1ab9a11ce10fe3c5
-
SHA1
e15f23f2e1981062318ebc384d11af8e015ade10
-
SHA256
97a01eea8c647df06b278b0651de28bb60f615da3fc00ef2e08a363b3fd33770
-
SHA512
f6662bcf47dbaecff36aaddc2da0ee41d6f1c07fe2e3591fef5db6c2f3123d3857577d66834801b5d94a7d577294a3ef654b200992ba2dd528f50a218b7c8fdb
-
SSDEEP
196608:WjFbeyAeN/FJMIDJf0gsAGK5SEQRzuAKw9RW:iv/Fqyf0gsfNiAKJ
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-