General
-
Target
loader.exe
-
Size
7.4MB
-
Sample
241014-f2229svakp
-
MD5
4d662bb483557cae6c840302696b8d4f
-
SHA1
7b0bb6f7b8e58a0840e32ea1faf0776013980cc6
-
SHA256
8ae52f6852caea6485e55ec421a80696fe264447f122cde7017380892718eb88
-
SHA512
ca4ed1ea327172d6fd9f3f1a51d233743f711de89fbf9246ddc8c1035449352855903f022a316841fd6f1272287f12e2cc49fa6008b07f6783c1ee31a596db29
-
SSDEEP
98304:zqSi8x9XQsTurErvz81LpWjjUa50ZtPvYRt2e4GFNGjfzfbIbApJo4EAKhOC112K:zNP9VTurErvI9pWjgfPvzm6gsFE14AZ
Behavioral task
behavioral1
Sample
loader.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
loader.exe
-
Size
7.4MB
-
MD5
4d662bb483557cae6c840302696b8d4f
-
SHA1
7b0bb6f7b8e58a0840e32ea1faf0776013980cc6
-
SHA256
8ae52f6852caea6485e55ec421a80696fe264447f122cde7017380892718eb88
-
SHA512
ca4ed1ea327172d6fd9f3f1a51d233743f711de89fbf9246ddc8c1035449352855903f022a316841fd6f1272287f12e2cc49fa6008b07f6783c1ee31a596db29
-
SSDEEP
98304:zqSi8x9XQsTurErvz81LpWjjUa50ZtPvYRt2e4GFNGjfzfbIbApJo4EAKhOC112K:zNP9VTurErvI9pWjgfPvzm6gsFE14AZ
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-