General
-
Target
krambus_injector.rar
-
Size
6.8MB
-
Sample
241016-jvdymszgqc
-
MD5
f649d3caf11e83d419be388d5a2699ff
-
SHA1
bdcade6d3730907200cc6a10128414aa4bfd7563
-
SHA256
49df7d02c1181f22d4141dc27cb02e13ef427c1bbc4b6b1d5df061ab704e40c9
-
SHA512
a2203acfd00118b22a8926094052a85ffa7ed42713bec4aa3717e46efd69f60c64a40a7153e3a67cc4bdc80e61cef53388cbf17be6df905f81bfd059c0e9a31c
-
SSDEEP
196608:vBP5699TGuvbB6iLbrnXkHzKmT0aVDB/gfLtIr:ZP563Z/UHJT0a3gfLtk
Behavioral task
behavioral1
Sample
krambus.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
krambus.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
z��Py5A.pyc
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
z��Py5A.pyc
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
krambus.exe
-
Size
6.9MB
-
MD5
50afda704ab69b60ea2d25c84f779c3f
-
SHA1
c77c325c2cbf4053633ccfcd06a9d3dd2cbb1c38
-
SHA256
fc913469c47ff2fa16df4814d9bd7e9bda7fcd2fd9fe1cc130738681df381f3a
-
SHA512
27c75d06c7c2d1673b0faf85deb21c0bcd6d1ec3331d3ff558f4c1ac49d9714b9363cb5220ccdd065972db239dfa4d34c7ff5be0c6fa2bf39a7689db61f52495
-
SSDEEP
98304:agDjWM8JEE1rgBamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeR8YKJJcGhEIFd:ag0/eNTfm/pf+xk4dWR8trbWOjgs+6
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
-
-
Target
z��Py5A.pyc
-
Size
1KB
-
MD5
152196a496740d497515b1955aa6d075
-
SHA1
ec8e1c8d34e67316b3548e81e9e8ca1483259208
-
SHA256
5085ff7f5c1a07bee242538353a9bca469d7f30b2d6ba7665f86e20b60d6df23
-
SHA512
26dc96b66bdf3a7b3573a1b7418a3e50c28c59228556c9dc29eb7ea892fa2208ba1e1c71ca01d78597744287a5d4a55d1ea39dcc66d3436509d89385a6cfd7cb
Score1/10 -