General
-
Target
ba55650308db050704331599dc2dca653839b5e93b5957786051a907fd25963cN
-
Size
240KB
-
Sample
241028-rw77wa1fpd
-
MD5
6ac85e78114ccf28fefbaaeb3a4c5f40
-
SHA1
22917a650f55dc7e466015b9aefc7d44b6baa67f
-
SHA256
ba55650308db050704331599dc2dca653839b5e93b5957786051a907fd25963c
-
SHA512
23476239a528bfa99ecfed26dc41e20375763ca80505a5ef7cc21096e296238c9dff886f9690a417876f4d4065775da700a3ace5287efab4be77fb59845553de
-
SSDEEP
3072:+2VrWC2IjTtCv/01vA4bCsWMxC7oJ9PNHnCvJgYizShv48P2Ae0mUeLhPUe98beE:ZVroI3tCi/DfHfWJgp98bezsAFK4
Behavioral task
behavioral1
Sample
ba55650308db050704331599dc2dca653839b5e93b5957786051a907fd25963cN.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
ba55650308db050704331599dc2dca653839b5e93b5957786051a907fd25963cN
-
Size
240KB
-
MD5
6ac85e78114ccf28fefbaaeb3a4c5f40
-
SHA1
22917a650f55dc7e466015b9aefc7d44b6baa67f
-
SHA256
ba55650308db050704331599dc2dca653839b5e93b5957786051a907fd25963c
-
SHA512
23476239a528bfa99ecfed26dc41e20375763ca80505a5ef7cc21096e296238c9dff886f9690a417876f4d4065775da700a3ace5287efab4be77fb59845553de
-
SSDEEP
3072:+2VrWC2IjTtCv/01vA4bCsWMxC7oJ9PNHnCvJgYizShv48P2Ae0mUeLhPUe98beE:ZVroI3tCi/DfHfWJgp98bezsAFK4
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Legion stealer payload
-
Legion family
-
Legion, RobotDropper, Satacom
Legion aka 'RobotDropper' or 'Satacom' is a malware downloader written in C++ and Legion stealer is written C#.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1