General
-
Target
serc PRIV V2.exe
-
Size
6.0MB
-
Sample
241016-wyfymathqa
-
MD5
acfe97bfc66a1a9d6a279fd612a218b5
-
SHA1
b6f01e5fe783659aa0988566db778449dd7eb35d
-
SHA256
748c3f71790efb4b8170fc3835c70af2255f648f34c87b77bf8c615ceaf071af
-
SHA512
8d6e4d9cca83a20d1e1dca5984143712f70ad15e615922cf9e0d4708db69692d7be3c280801f50ba5dde3cef04f48f21526c28c843b47be808bca52709965600
-
SSDEEP
98304:QEEtdFBgwvaamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RSPMDp3fMWZd:QTFBzeN/FJMIDJf0gsAGK4RSkDmWZd
Behavioral task
behavioral1
Sample
serc PRIV V2.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
serc PRIV V2.exe
-
Size
6.0MB
-
MD5
acfe97bfc66a1a9d6a279fd612a218b5
-
SHA1
b6f01e5fe783659aa0988566db778449dd7eb35d
-
SHA256
748c3f71790efb4b8170fc3835c70af2255f648f34c87b77bf8c615ceaf071af
-
SHA512
8d6e4d9cca83a20d1e1dca5984143712f70ad15e615922cf9e0d4708db69692d7be3c280801f50ba5dde3cef04f48f21526c28c843b47be808bca52709965600
-
SSDEEP
98304:QEEtdFBgwvaamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RSPMDp3fMWZd:QTFBzeN/FJMIDJf0gsAGK4RSkDmWZd
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-