General
-
Target
Astral V1.1 (1).exe
-
Size
7.6MB
-
Sample
241020-3e9vxsyamk
-
MD5
4b6563d7181320b3e2b223ffc16330fe
-
SHA1
9069c23dc3ae72b747a422f13fb8c6c2f487eab6
-
SHA256
ded351fbc1c5845d435b5bef7b713b4bc20cd4189ac80acf7787541363d28e8a
-
SHA512
66f1782cf97a8d5060240de85abfe853726a9001b776b317043508c0ad5f158c69334bf75f4caecab046f2c9f90927d46f4b548720dc527e70e4712ce29b77f6
-
SSDEEP
196608:Q1QHYMRwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jC:ajIHziK1piXLGVE4Ue0VJe
Malware Config
Targets
-
-
Target
Astral V1.1 (1).exe
-
Size
7.6MB
-
MD5
4b6563d7181320b3e2b223ffc16330fe
-
SHA1
9069c23dc3ae72b747a422f13fb8c6c2f487eab6
-
SHA256
ded351fbc1c5845d435b5bef7b713b4bc20cd4189ac80acf7787541363d28e8a
-
SHA512
66f1782cf97a8d5060240de85abfe853726a9001b776b317043508c0ad5f158c69334bf75f4caecab046f2c9f90927d46f4b548720dc527e70e4712ce29b77f6
-
SSDEEP
196608:Q1QHYMRwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jC:ajIHziK1piXLGVE4Ue0VJe
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-