General
-
Target
Blank.exe
-
Size
8.1MB
-
Sample
241021-zpzwxsxgqr
-
MD5
cfc23f0a53034e84030ea46fa9f4e3a1
-
SHA1
9eeba0886f7d90ac4aad4e4a1d4e29c551bfc5e6
-
SHA256
4d1ecd13d9f12170b18ee48d8097c83b9e4d7fdc04911058b1657e3767f3f77e
-
SHA512
47c6b97862e5cca262176a087846116beeb04e82483079ea1c9c722f0cb432e960cdd71cc5d1b7fa109e67327bb6235bdb0e3a7e20f856c3d5bf4d15fed9c250
-
SSDEEP
196608:dWBiEurErvI9pWjg/Qc+4o673pNrabebSEdyzWGPMYnN9sp:UNurEUWjZZ4dDLIeW7zWGPTNCp
Behavioral task
behavioral1
Sample
Blank.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Blank.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
d�e���.pyc
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
d�e���.pyc
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Blank.exe
-
Size
8.1MB
-
MD5
cfc23f0a53034e84030ea46fa9f4e3a1
-
SHA1
9eeba0886f7d90ac4aad4e4a1d4e29c551bfc5e6
-
SHA256
4d1ecd13d9f12170b18ee48d8097c83b9e4d7fdc04911058b1657e3767f3f77e
-
SHA512
47c6b97862e5cca262176a087846116beeb04e82483079ea1c9c722f0cb432e960cdd71cc5d1b7fa109e67327bb6235bdb0e3a7e20f856c3d5bf4d15fed9c250
-
SSDEEP
196608:dWBiEurErvI9pWjg/Qc+4o673pNrabebSEdyzWGPMYnN9sp:UNurEUWjZZ4dDLIeW7zWGPTNCp
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
-
-
Target
d�e���.pyc
-
Size
1KB
-
MD5
2ef1bbbdcb76b7730cf0f675a05207e2
-
SHA1
1a834973493e0e0e7b201789b716c47e94436052
-
SHA256
e0766aa112cac07e1c053b823455860d151ac01857aa5f40797ba947215a2c84
-
SHA512
7fc647423686b6e100221a0ba3ee06e633fb8d56ff85de5d196e43b86b70c43f389701130be582a186dd9277e2cdd3074ad99bcf20100118de5705e92087c02d
Score1/10 -