General
-
Target
Built.exe
-
Size
6.9MB
-
Sample
241027-x88basypdw
-
MD5
3cc660d3a85c25826a5f1af41511db25
-
SHA1
69183e43df0f931970d16e7d6637c5fb4eeee799
-
SHA256
aa9582350b7bdfda4c705f9dc7f8acc00ad767645b3a25bd92ff25fe4af2685e
-
SHA512
9ae88b78733cf91f46c1fb2fa787241f76b9351723deb3a2393d482d6a862e7b0d5a9f93116dbec2f81aa4e96b1b3160c29e253816e024fe9ca637ce85e5e3f2
-
SSDEEP
196608:mIV1vVhB6ylnlPzf+JiJCsmFMvln6hqg2:5VhBRlnlPSa7mmvlpg2
Behavioral task
behavioral1
Sample
Built.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
Built.exe
-
Size
6.9MB
-
MD5
3cc660d3a85c25826a5f1af41511db25
-
SHA1
69183e43df0f931970d16e7d6637c5fb4eeee799
-
SHA256
aa9582350b7bdfda4c705f9dc7f8acc00ad767645b3a25bd92ff25fe4af2685e
-
SHA512
9ae88b78733cf91f46c1fb2fa787241f76b9351723deb3a2393d482d6a862e7b0d5a9f93116dbec2f81aa4e96b1b3160c29e253816e024fe9ca637ce85e5e3f2
-
SSDEEP
196608:mIV1vVhB6ylnlPzf+JiJCsmFMvln6hqg2:5VhBRlnlPSa7mmvlpg2
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-