General
-
Target
Built.exe
-
Size
6.9MB
-
Sample
241015-yzgyesyfmk
-
MD5
85bfd2f275cd91de7051abdf3c1f56c7
-
SHA1
ea0d6882aabb75549123f43b56f7dd10661b7aa2
-
SHA256
8ee0599736bf583abba3ca3ff642922b0df268f48b38ddcbb16b24cb92a62e96
-
SHA512
bc60fac5b334b0c58f5e85285db43b37436e03e3043db5a01f3fbad66791f818ad090785806fe719645c88bfd4ba0124affd1f3d85d5aafc62cc7fbfa95d5b58
-
SSDEEP
98304:V8DjWM8JEE1rKtamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEIFh:V80VeNTfm/pf+xk4dWRptrbWOjgrq
Behavioral task
behavioral1
Sample
Built.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
Built.exe
-
Size
6.9MB
-
MD5
85bfd2f275cd91de7051abdf3c1f56c7
-
SHA1
ea0d6882aabb75549123f43b56f7dd10661b7aa2
-
SHA256
8ee0599736bf583abba3ca3ff642922b0df268f48b38ddcbb16b24cb92a62e96
-
SHA512
bc60fac5b334b0c58f5e85285db43b37436e03e3043db5a01f3fbad66791f818ad090785806fe719645c88bfd4ba0124affd1f3d85d5aafc62cc7fbfa95d5b58
-
SSDEEP
98304:V8DjWM8JEE1rKtamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEIFh:V80VeNTfm/pf+xk4dWRptrbWOjgrq
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-