General
-
Target
Built.exe
-
Size
6.9MB
-
Sample
241015-pgw5ysxglq
-
MD5
13d7e2b6dc2c9faf6ec82676b911371d
-
SHA1
c6e92ae3efad698f2da75c682dd2836152bf4c9c
-
SHA256
d4527d45795d34e8a13a8941376b44ea4bf5f8efb6a92b236a237a8613f6278e
-
SHA512
b56e31631d28462fdafa1602ebaa83e7cdfbbfe6c6d2caed2fe37c4e6a99d24c6bd3ec80229ddfd6af2e9cbd82c789227dbf822307954d18b3c47cdfc46bd125
-
SSDEEP
98304:vbDjWM8JEE1r2lamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEIFI:vb0leNTfm/pf+xk4dWRptrbWOjgr/
Malware Config
Targets
-
-
Target
Built.exe
-
Size
6.9MB
-
MD5
13d7e2b6dc2c9faf6ec82676b911371d
-
SHA1
c6e92ae3efad698f2da75c682dd2836152bf4c9c
-
SHA256
d4527d45795d34e8a13a8941376b44ea4bf5f8efb6a92b236a237a8613f6278e
-
SHA512
b56e31631d28462fdafa1602ebaa83e7cdfbbfe6c6d2caed2fe37c4e6a99d24c6bd3ec80229ddfd6af2e9cbd82c789227dbf822307954d18b3c47cdfc46bd125
-
SSDEEP
98304:vbDjWM8JEE1r2lamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEIFI:vb0leNTfm/pf+xk4dWRptrbWOjgr/
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-