General
-
Target
Built.exe
-
Size
6.0MB
-
Sample
241014-q28vxsyaqa
-
MD5
56dc67e45d4b92f10b93f593ba0a0f12
-
SHA1
fa3851e48e04f1a57a46407be19a720d52f1cc92
-
SHA256
67438ba5968d015811fc045d557ba1edd1e3bf563ecd9a8d9140e6bfad781737
-
SHA512
adeb8e5cf864b872a246a20312323197b9fcfbeb34cac0ea5b5f24fa17bc0221376e94b3b6f15c9bc8ad283df49a3e17538947bfe90fae22c7fb1f57ce400bcb
-
SSDEEP
98304:YnEtdFBGjamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RuOuAK5QnNeyE:YWFEGeN/FJMIDJf0gsAGK4RtuAK5GFE
Malware Config
Targets
-
-
Target
Built.exe
-
Size
6.0MB
-
MD5
56dc67e45d4b92f10b93f593ba0a0f12
-
SHA1
fa3851e48e04f1a57a46407be19a720d52f1cc92
-
SHA256
67438ba5968d015811fc045d557ba1edd1e3bf563ecd9a8d9140e6bfad781737
-
SHA512
adeb8e5cf864b872a246a20312323197b9fcfbeb34cac0ea5b5f24fa17bc0221376e94b3b6f15c9bc8ad283df49a3e17538947bfe90fae22c7fb1f57ce400bcb
-
SSDEEP
98304:YnEtdFBGjamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RuOuAK5QnNeyE:YWFEGeN/FJMIDJf0gsAGK4RtuAK5GFE
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-