General
-
Target
Built.exe
-
Size
6.8MB
-
Sample
241025-qllqfs1cpl
-
MD5
a9df313f462abebaf98279a0798ef9d3
-
SHA1
7af383e6a9d8168fcdb5ca0bbfe787750ed46094
-
SHA256
1d6b2820f9d6840a6c6775eb46b396cc4e7b592c920d9e2c1e992236ed54a39b
-
SHA512
af67b702c73e88449108046d4764885563fd918aec32e375095deab19ae8dfaaf02e46c1207f8a0a87706d118b08fab75e4903f7a031fffbeb6555e0e3805060
-
SSDEEP
196608:CntYQHseNtx+yAiWfR0FHpdoGSECfsA5njA5:AtL77QfR0xpkFsSjA5
Behavioral task
behavioral1
Sample
Built.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
Built.exe
-
Size
6.8MB
-
MD5
a9df313f462abebaf98279a0798ef9d3
-
SHA1
7af383e6a9d8168fcdb5ca0bbfe787750ed46094
-
SHA256
1d6b2820f9d6840a6c6775eb46b396cc4e7b592c920d9e2c1e992236ed54a39b
-
SHA512
af67b702c73e88449108046d4764885563fd918aec32e375095deab19ae8dfaaf02e46c1207f8a0a87706d118b08fab75e4903f7a031fffbeb6555e0e3805060
-
SSDEEP
196608:CntYQHseNtx+yAiWfR0FHpdoGSECfsA5njA5:AtL77QfR0xpkFsSjA5
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-