General
-
Target
f97b2429814b07f34f7d4103304b66a87ac24b6e3fd0369b2071e40d8e4b0573
-
Size
6.9MB
-
Sample
241015-htbapavenp
-
MD5
363a21f6e94c928743432fca85a72403
-
SHA1
461b86b519021ac9d86920f522b2b7e2180a27fd
-
SHA256
f97b2429814b07f34f7d4103304b66a87ac24b6e3fd0369b2071e40d8e4b0573
-
SHA512
3fca23c9bcd5f89d70664f2a034ee4f6254348c7f78e644d19c691f3329458c779ee28a8677f48057a24b6ae250695352b64ae027304b6b096c51bcd2bb6f27a
-
SSDEEP
98304:euzHqdVfB2FS27wByuT/9vUIdD9C+z3zO917vOTh+ezDNh75vmJ1nmOBN9n4mUMX:euQsIbT/9bvLz3S1bA3z4n975
Behavioral task
behavioral1
Sample
f97b2429814b07f34f7d4103304b66a87ac24b6e3fd0369b2071e40d8e4b0573.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
f97b2429814b07f34f7d4103304b66a87ac24b6e3fd0369b2071e40d8e4b0573
-
Size
6.9MB
-
MD5
363a21f6e94c928743432fca85a72403
-
SHA1
461b86b519021ac9d86920f522b2b7e2180a27fd
-
SHA256
f97b2429814b07f34f7d4103304b66a87ac24b6e3fd0369b2071e40d8e4b0573
-
SHA512
3fca23c9bcd5f89d70664f2a034ee4f6254348c7f78e644d19c691f3329458c779ee28a8677f48057a24b6ae250695352b64ae027304b6b096c51bcd2bb6f27a
-
SSDEEP
98304:euzHqdVfB2FS27wByuT/9vUIdD9C+z3zO917vOTh+ezDNh75vmJ1nmOBN9n4mUMX:euQsIbT/9bvLz3S1bA3z4n975
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-