General
-
Target
k3spatch(RUNFIRST).exe
-
Size
7.7MB
-
Sample
241021-3zsr5stgnb
-
MD5
f7eff2fc4e934bffbf56d6be4b650182
-
SHA1
d6da9ae4b19e9ed4f46deff2c0fabd3234db1c1c
-
SHA256
0936177bc574fab7afde2327bfb0c7ca746d26098aa68b5f28eea1e930efb4d0
-
SHA512
bc1ddd7f5840a0de32789ff62d169ddbd54af50d93896b7c5c5b97e2f848b5f80e51a8614f783be58f23aaa5ce88b9bac17a69601087b741152401b7c6affaeb
-
SSDEEP
196608:Ux0YC+GeNTfm/pf+xk4dfrl7RptrbWOjgr3:SBy/pWu4NpRptrbvMr3
Behavioral task
behavioral1
Sample
k3spatch(RUNFIRST).exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
k3spatch(RUNFIRST).exe
-
Size
7.7MB
-
MD5
f7eff2fc4e934bffbf56d6be4b650182
-
SHA1
d6da9ae4b19e9ed4f46deff2c0fabd3234db1c1c
-
SHA256
0936177bc574fab7afde2327bfb0c7ca746d26098aa68b5f28eea1e930efb4d0
-
SHA512
bc1ddd7f5840a0de32789ff62d169ddbd54af50d93896b7c5c5b97e2f848b5f80e51a8614f783be58f23aaa5ce88b9bac17a69601087b741152401b7c6affaeb
-
SSDEEP
196608:Ux0YC+GeNTfm/pf+xk4dfrl7RptrbWOjgr3:SBy/pWu4NpRptrbvMr3
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-