General
-
Target
Warden.exe
-
Size
8.3MB
-
Sample
241026-xe42sayckk
-
MD5
3763392a286de739ce2e6b017203d992
-
SHA1
de08bb972a11d00582b00f4feff553281d884121
-
SHA256
378a0e33acd8f92552291a118b8fd5d09649d84f9856137bf3cdfa123e6871d0
-
SHA512
5c6ab52054f5b35173e4459dcfdbdf500e72ab6684cd7940e03771524cd94bc04526b2c1e6995d9c8af529316fce06fae2575d1bc0d23bad56af79aa518d1bee
-
SSDEEP
196608:KlgpSwfI9jUC2gYBYv3vbW4SE3DcGiwwnb:3HIH2gYBgDWZIjf6b
Malware Config
Targets
-
-
Target
Warden.exe
-
Size
8.3MB
-
MD5
3763392a286de739ce2e6b017203d992
-
SHA1
de08bb972a11d00582b00f4feff553281d884121
-
SHA256
378a0e33acd8f92552291a118b8fd5d09649d84f9856137bf3cdfa123e6871d0
-
SHA512
5c6ab52054f5b35173e4459dcfdbdf500e72ab6684cd7940e03771524cd94bc04526b2c1e6995d9c8af529316fce06fae2575d1bc0d23bad56af79aa518d1bee
-
SSDEEP
196608:KlgpSwfI9jUC2gYBYv3vbW4SE3DcGiwwnb:3HIH2gYBgDWZIjf6b
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-