General
-
Target
vixen2.0.exe
-
Size
8.2MB
-
Sample
241020-1jkqgs1gra
-
MD5
d4f9ca03abc3b60b1fa919409cc37c4b
-
SHA1
01ebaeb0b5c2935d6890aec09d95c6bbc85d39b1
-
SHA256
babd1c5d627a996f61758f3a62b9d85f06f6f99750d5196f0c6856c59c1a293b
-
SHA512
e0c8a1c9b5d4e59efc3602b3d084fd018c31f4cfd2dc2d52605c61988e7c8a44656e884ab91c7285bb5fde2a8e62c351062b1184b0cf6e3a4ec8466960d2d240
-
SSDEEP
196608:snEzULjv+bhqNVoB8Ck5c7GpNlpq41J2ySEqbk9qtl8f8j+:k9L+9qz88Ck+7q3p91Jm+dfE+
Behavioral task
behavioral1
Sample
vixen2.0.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
vixen2.0.exe
-
Size
8.2MB
-
MD5
d4f9ca03abc3b60b1fa919409cc37c4b
-
SHA1
01ebaeb0b5c2935d6890aec09d95c6bbc85d39b1
-
SHA256
babd1c5d627a996f61758f3a62b9d85f06f6f99750d5196f0c6856c59c1a293b
-
SHA512
e0c8a1c9b5d4e59efc3602b3d084fd018c31f4cfd2dc2d52605c61988e7c8a44656e884ab91c7285bb5fde2a8e62c351062b1184b0cf6e3a4ec8466960d2d240
-
SSDEEP
196608:snEzULjv+bhqNVoB8Ck5c7GpNlpq41J2ySEqbk9qtl8f8j+:k9L+9qz88Ck+7q3p91Jm+dfE+
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-