General
-
Target
Built.exe
-
Size
6.9MB
-
Sample
241015-n62w3axbrq
-
MD5
c01ef6c50c50e965c1b00ad14ac033cf
-
SHA1
490e85442faddc014f9c2f2ec63bb69095c66b56
-
SHA256
276551df72cfefde4969198d823ebf586abc353f29e06ab42816062dc0b7f02c
-
SHA512
5b105b6303e3195f573032a676222da6ce459b841ae381de1bdcef6d8712af27156c07b9425f28d314d57535ba876d629ab6e164f657877f317c907c816d82d1
-
SSDEEP
98304:OaDjWM8JEE1rfCamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEIFl:Oa0v7eNTfm/pf+xk4dWRptrbWOjgra
Malware Config
Targets
-
-
Target
Built.exe
-
Size
6.9MB
-
MD5
c01ef6c50c50e965c1b00ad14ac033cf
-
SHA1
490e85442faddc014f9c2f2ec63bb69095c66b56
-
SHA256
276551df72cfefde4969198d823ebf586abc353f29e06ab42816062dc0b7f02c
-
SHA512
5b105b6303e3195f573032a676222da6ce459b841ae381de1bdcef6d8712af27156c07b9425f28d314d57535ba876d629ab6e164f657877f317c907c816d82d1
-
SSDEEP
98304:OaDjWM8JEE1rfCamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEIFl:Oa0v7eNTfm/pf+xk4dWRptrbWOjgra
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates processes with tasklist
-