General
-
Target
Built.exe
-
Size
7.6MB
-
Sample
241025-xjchbs1kdz
-
MD5
db84136289535ba52751522289aadcf9
-
SHA1
c75941d1578c5c06b25cc6ca053a090ea9eb0706
-
SHA256
a329b99ee2ca06bd4b01f7b435020f272776859f4fcb8ad9dff5c22e132e413f
-
SHA512
f50601950a392727a9e30d945781f64703e243649ba5b03b30564d84b7215e918e37049c226ad9b27ebd6000137c5cb3a942253d7d41a4e1a18a5e6798999fdb
-
SSDEEP
196608:JhHYowfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jy:kIHziK1piXLGVE4Ue0VJO
Behavioral task
behavioral1
Sample
Built.exe
Resource
win7-20241023-en
Malware Config
Targets
-
-
Target
Built.exe
-
Size
7.6MB
-
MD5
db84136289535ba52751522289aadcf9
-
SHA1
c75941d1578c5c06b25cc6ca053a090ea9eb0706
-
SHA256
a329b99ee2ca06bd4b01f7b435020f272776859f4fcb8ad9dff5c22e132e413f
-
SHA512
f50601950a392727a9e30d945781f64703e243649ba5b03b30564d84b7215e918e37049c226ad9b27ebd6000137c5cb3a942253d7d41a4e1a18a5e6798999fdb
-
SSDEEP
196608:JhHYowfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jy:kIHziK1piXLGVE4Ue0VJO
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-