General
-
Target
Built.exe
-
Size
6.9MB
-
Sample
241016-vngxha1crb
-
MD5
c0016b96aeb25370a238bec4978a2b4e
-
SHA1
9eff3107fd308b110d3d660cbdf952fe484ada59
-
SHA256
b803d8573fd74702dc6685b2e87bdbc1766e5b67bce7880612c3d0af2663ce76
-
SHA512
8be40138438c39e95a2093e6c4703e1b00398363b486ec42814740276c4cd81cf5ec7c07f97ad3ff22246a4003a3d09693a6a8156882771288320213be0d2d6e
-
SSDEEP
98304:8vDjWM8JEE1rPZamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEIF8:8v0seNTfm/pf+xk4dWRptrbWOjgrb
Malware Config
Targets
-
-
Target
Built.exe
-
Size
6.9MB
-
MD5
c0016b96aeb25370a238bec4978a2b4e
-
SHA1
9eff3107fd308b110d3d660cbdf952fe484ada59
-
SHA256
b803d8573fd74702dc6685b2e87bdbc1766e5b67bce7880612c3d0af2663ce76
-
SHA512
8be40138438c39e95a2093e6c4703e1b00398363b486ec42814740276c4cd81cf5ec7c07f97ad3ff22246a4003a3d09693a6a8156882771288320213be0d2d6e
-
SSDEEP
98304:8vDjWM8JEE1rPZamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEIF8:8v0seNTfm/pf+xk4dWRptrbWOjgrb
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Loads dropped DLL
-
Enumerates processes with tasklist
-