General
-
Target
Built.exe
-
Size
7.5MB
-
Sample
241019-kd1azsycnl
-
MD5
cb06608822085f5911fc76736f13bc97
-
SHA1
89322abb771c956b61f42309a5d27bb84afc62bb
-
SHA256
9ad34ccc1e2fb6b719f4804117796ae7e826654bdfd8f36ae2366e836ff823ae
-
SHA512
2207187ab730b07912877e7ef5e66c4b694eacaa04060e6b801b840bffa949c5ebd2316e16b26c303a7b2f0d34f1edd8dec8a9adc3664ac71f5e4e0a374b0d36
-
SSDEEP
196608:zSgFHwfI9jUC2gYBYv3vbW5+iITm1U6f2:/FMIH2gYBgDW4TOzu
Behavioral task
behavioral1
Sample
Built.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
Built.exe
-
Size
7.5MB
-
MD5
cb06608822085f5911fc76736f13bc97
-
SHA1
89322abb771c956b61f42309a5d27bb84afc62bb
-
SHA256
9ad34ccc1e2fb6b719f4804117796ae7e826654bdfd8f36ae2366e836ff823ae
-
SHA512
2207187ab730b07912877e7ef5e66c4b694eacaa04060e6b801b840bffa949c5ebd2316e16b26c303a7b2f0d34f1edd8dec8a9adc3664ac71f5e4e0a374b0d36
-
SSDEEP
196608:zSgFHwfI9jUC2gYBYv3vbW5+iITm1U6f2:/FMIH2gYBgDW4TOzu
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-