General
-
Target
loader.exe
-
Size
7.6MB
-
Sample
241027-xnavasykdk
-
MD5
49f226ca9f9d86f2c721a631356b2ab5
-
SHA1
daff433f2227dc7ef5ba1840ea8b8744230de3e5
-
SHA256
ceadb4f61e68e795011cace42b5fc023cf135086c3bb41953692aa288312f180
-
SHA512
b426385195692f621d4411e0183a3b90cd6ba932ad372c79fae73d72f7966ac342c58b9819b73620565c6d377cd3069a317d86be2cfd7906033c24bd010e89c2
-
SSDEEP
196608:7zHYYPKwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jG:1IHziK1piXLGVE4Ue0VJC
Behavioral task
behavioral1
Sample
loader.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
loader.exe
-
Size
7.6MB
-
MD5
49f226ca9f9d86f2c721a631356b2ab5
-
SHA1
daff433f2227dc7ef5ba1840ea8b8744230de3e5
-
SHA256
ceadb4f61e68e795011cace42b5fc023cf135086c3bb41953692aa288312f180
-
SHA512
b426385195692f621d4411e0183a3b90cd6ba932ad372c79fae73d72f7966ac342c58b9819b73620565c6d377cd3069a317d86be2cfd7906033c24bd010e89c2
-
SSDEEP
196608:7zHYYPKwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jG:1IHziK1piXLGVE4Ue0VJC
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-