General
-
Target
Built.exe
-
Size
17.6MB
-
Sample
241026-y91taawnfj
-
MD5
d345395c94526a6560376c0fa4483825
-
SHA1
7124e8cec0641e614d599a55e0ced4527519f698
-
SHA256
5f0fc08096058a29983544c5f09d9b724c0be4b4c93bed1a97a435bb120246a3
-
SHA512
7a7c3fea87c88770a04f4a1fa84133932201366da19e7a60229cbeba2b155b4645792750b28a0c9e6aafcd3c2c92283d05287aebd4553e84b45e7b4713f2df2e
-
SSDEEP
393216:EFNhC2R4GD6zlIDovPUvNP+9V8MjC+WR+ijYpBX1NIH2gYBgDW4TOzn:EFNj5mzlgSPUF29lWRDyRBB+WTn
Behavioral task
behavioral1
Sample
Built.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Built.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Built.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral4
Sample
Built.exe
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral5
Sample
Built.exe
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral6
Sample
Built.exe
Resource
debian9-mipsel-20240611-en
Malware Config
Targets
-
-
Target
Built.exe
-
Size
17.6MB
-
MD5
d345395c94526a6560376c0fa4483825
-
SHA1
7124e8cec0641e614d599a55e0ced4527519f698
-
SHA256
5f0fc08096058a29983544c5f09d9b724c0be4b4c93bed1a97a435bb120246a3
-
SHA512
7a7c3fea87c88770a04f4a1fa84133932201366da19e7a60229cbeba2b155b4645792750b28a0c9e6aafcd3c2c92283d05287aebd4553e84b45e7b4713f2df2e
-
SSDEEP
393216:EFNhC2R4GD6zlIDovPUvNP+9V8MjC+WR+ijYpBX1NIH2gYBgDW4TOzn:EFNj5mzlgSPUF29lWRDyRBB+WTn
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-