General
-
Target
DEVOUR.exe
-
Size
10.0MB
-
Sample
241027-mc639avket
-
MD5
ca811f74e36bddc62d665b801f4486a6
-
SHA1
4982cfffac5cbb7d627cd4d23dc1a5f4dea240eb
-
SHA256
b8cc06250372ccac1c9d1dbfe734c157ee2608ab2cf4a5660379981b0094ef0d
-
SHA512
9bde797426a333262851959c429d58d6fb99a202178e2f009d2757c30477d6eb3b9757837ef51046ba8a336a63d19b34bdf7957b2283c886ea8528129f721d45
-
SSDEEP
196608:k3HYAwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/j8:xIHziK1piXLGVE4Ue0VJY
Malware Config
Targets
-
-
Target
DEVOUR.exe
-
Size
10.0MB
-
MD5
ca811f74e36bddc62d665b801f4486a6
-
SHA1
4982cfffac5cbb7d627cd4d23dc1a5f4dea240eb
-
SHA256
b8cc06250372ccac1c9d1dbfe734c157ee2608ab2cf4a5660379981b0094ef0d
-
SHA512
9bde797426a333262851959c429d58d6fb99a202178e2f009d2757c30477d6eb3b9757837ef51046ba8a336a63d19b34bdf7957b2283c886ea8528129f721d45
-
SSDEEP
196608:k3HYAwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/j8:xIHziK1piXLGVE4Ue0VJY
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-