General
-
Target
archiveNew.zip
-
Size
143.6MB
-
Sample
241026-w3vbtayapk
-
MD5
a8fc24fe65d99f95eb044c2c233c6d2d
-
SHA1
c19f64d122186fa8fcc7fb7d042f58ac419d1b2f
-
SHA256
963c15274fc34edaf704feb2ad16ffa13e3d66a170728dad7831ba7b686424ed
-
SHA512
163a4e16eb68ec3f018b5cceec350909940d8e982d1c07da6de427bd0e036ca3a3749d56b7aae43e72e433738ce6718cb5e2857f4c5aa158c962c05d9467691d
-
SSDEEP
3145728:3deKZnQJwQvedhiSPSh9IcQyFkn1KaHdBbd6N2hH981Ao0yWLg6pmbOk:MKVQmaqhiSPFqkka9T6l2vyF6pmbOk
Behavioral task
behavioral1
Sample
archiveNew.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
archiveNew.zip
Resource
win10ltsc2021-20241023-en
Malware Config
Targets
-
-
Target
archiveNew.zip
-
Size
143.6MB
-
MD5
a8fc24fe65d99f95eb044c2c233c6d2d
-
SHA1
c19f64d122186fa8fcc7fb7d042f58ac419d1b2f
-
SHA256
963c15274fc34edaf704feb2ad16ffa13e3d66a170728dad7831ba7b686424ed
-
SHA512
163a4e16eb68ec3f018b5cceec350909940d8e982d1c07da6de427bd0e036ca3a3749d56b7aae43e72e433738ce6718cb5e2857f4c5aa158c962c05d9467691d
-
SSDEEP
3145728:3deKZnQJwQvedhiSPSh9IcQyFkn1KaHdBbd6N2hH981Ao0yWLg6pmbOk:MKVQmaqhiSPFqkka9T6l2vyF6pmbOk
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-