General
-
Target
Built.exe
-
Size
6.0MB
-
Sample
241028-ve3slsthlq
-
MD5
59ff07b6023f883dbfd74a6ec8f69e6c
-
SHA1
bf57f5e3acb875a1c97d622c14b39d8439d4d3ab
-
SHA256
f719cde52f1119088d1f9283d30a50eae772180479975718d2921b292c3eb952
-
SHA512
c0ce38de234d8ab1d05379936a2b322ca977bc1895fe2f064615a431a149f4ba1af234c6caafef58de505c9189cf9c3ef77b1d994454647b79f4c141730b04d0
-
SSDEEP
98304:evEtdFBCIDhamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RzOLPapmc3yo:eeFIIDceN/FJMIDJf0gsAGK4RyLPatio
Malware Config
Targets
-
-
Target
Built.exe
-
Size
6.0MB
-
MD5
59ff07b6023f883dbfd74a6ec8f69e6c
-
SHA1
bf57f5e3acb875a1c97d622c14b39d8439d4d3ab
-
SHA256
f719cde52f1119088d1f9283d30a50eae772180479975718d2921b292c3eb952
-
SHA512
c0ce38de234d8ab1d05379936a2b322ca977bc1895fe2f064615a431a149f4ba1af234c6caafef58de505c9189cf9c3ef77b1d994454647b79f4c141730b04d0
-
SSDEEP
98304:evEtdFBCIDhamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RzOLPapmc3yo:eeFIIDceN/FJMIDJf0gsAGK4RyLPatio
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-