General
-
Target
Executor.zip
-
Size
7.5MB
-
Sample
241021-xat11s1clf
-
MD5
76c9d92053b42a5f132af836a5494fa2
-
SHA1
359ee05973117272bbbc6d8c0d40029d39d87fc9
-
SHA256
092940948e0de4a2c0b33c3de39f753f8c738ddf9b89381c6809ab62d1d06530
-
SHA512
de6fa2226a935367e55f2845fb4b97b8220cf7fbe95edb9fd3e77457cc41899114c0bb23ed20932feff60bf888c4d009f2f37a3e117fa021bf4c40534b02d89e
-
SSDEEP
196608:ZVH0/wdYj1E4UJc2FBiWyXNG7mpDeHhNbvc4vymSyFFYBh8:ZHYoJcGBlyXNG7++L44vOk
Behavioral task
behavioral1
Sample
Executor/Executor.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
Executor/Executor.exe
-
Size
7.7MB
-
MD5
30340768fa640de1f7ccb644f59970a6
-
SHA1
c5d2420fa241fc984f85eeaaa01987b44c803e43
-
SHA256
58737eba38b03039542d9e6b5fff03eeb1b53b644986c62e25a57cb56b975389
-
SHA512
4b37ded75217f7b832c9b649605b5d7f3469e811b4146c5aca5465a4bd2cb57a0d78e8fe771960237ae8713da385aec7c317860d522c6ddd45e0884a4941876c
-
SSDEEP
196608:smAHYwwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jf:hnIHziK1piXLGVE4Ue0VJD
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-