General
-
Target
NewCode.exe
-
Size
7.6MB
-
Sample
241024-ntc26szdmj
-
MD5
7b9d8a8ca099bcaaf498de82d3881038
-
SHA1
d48f0303030e5aaec2a3fd4b8d8c4fbdbf59e655
-
SHA256
6627ae7cff4071802a78ab7ebff3e1a00d3b513bf276e20e803733c3866a1428
-
SHA512
61b7d90e2a2075dcdbd8e155b2934a863efaebba3a4b37782d6213fe923f1f8e2f9bfd3ab3e724ff79fa4e8cc640b8ff41d8334603655576b3461ad1dd88b788
-
SSDEEP
196608:86HYAwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/j0:iIHziK1piXLGVE4Ue0VJI
Malware Config
Targets
-
-
Target
NewCode.exe
-
Size
7.6MB
-
MD5
7b9d8a8ca099bcaaf498de82d3881038
-
SHA1
d48f0303030e5aaec2a3fd4b8d8c4fbdbf59e655
-
SHA256
6627ae7cff4071802a78ab7ebff3e1a00d3b513bf276e20e803733c3866a1428
-
SHA512
61b7d90e2a2075dcdbd8e155b2934a863efaebba3a4b37782d6213fe923f1f8e2f9bfd3ab3e724ff79fa4e8cc640b8ff41d8334603655576b3461ad1dd88b788
-
SSDEEP
196608:86HYAwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/j0:iIHziK1piXLGVE4Ue0VJI
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-