General
-
Target
SynapseX.exe
-
Size
8.2MB
-
Sample
241013-jpkt1azfmn
-
MD5
1f3840bb0e05da77a00c9c73c213c967
-
SHA1
33fc00a415e0fd3ed8337a7da9bd7f2a1af9c9ca
-
SHA256
6e1081e1997ffb076867f449f13778e5a58c98e6333def8b3fd539af5ef6ec21
-
SHA512
bc22201f4cc7bfee332f12261eb4cce36173687821b0c268905789dd8a6da4ec5a49fb39d6cb4d75e522ce5a2518d8c497968daacb84d2e30b6b90e89bb76fbf
-
SSDEEP
196608:RdJgurErvI9pWjgyvoaYrE41JISXCnICoxt:FgurEUWjdo/H1JpyDo3
Behavioral task
behavioral1
Sample
SynapseX.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
SynapseX.exe
-
Size
8.2MB
-
MD5
1f3840bb0e05da77a00c9c73c213c967
-
SHA1
33fc00a415e0fd3ed8337a7da9bd7f2a1af9c9ca
-
SHA256
6e1081e1997ffb076867f449f13778e5a58c98e6333def8b3fd539af5ef6ec21
-
SHA512
bc22201f4cc7bfee332f12261eb4cce36173687821b0c268905789dd8a6da4ec5a49fb39d6cb4d75e522ce5a2518d8c497968daacb84d2e30b6b90e89bb76fbf
-
SSDEEP
196608:RdJgurErvI9pWjgyvoaYrE41JISXCnICoxt:FgurEUWjdo/H1JpyDo3
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-