General
-
Target
C.WIN_Crack.exe
-
Size
7.6MB
-
Sample
241028-wd7wlsvblc
-
MD5
44b04397f4917fd985d60e19ee7047ee
-
SHA1
36e33d3d15c9d1316769854db23e33e448797e0d
-
SHA256
a3cf3e2f4e08aadefe6465bb9c19e30766375d778ffa0837a08ffbfd43d24fc3
-
SHA512
2d2135ca7c53e7982c9cb99c0a9091cee8a0091e252918b4507d9ada601c9aae4a32fd20fee0ceb58b86cf76e50c866a794bb83242aac6e17d1aec0016aecdf6
-
SSDEEP
196608:5ttRjurErvI9pWjgaAnajMsK2CfQCS/OinHC1e:vtRjurEUWjJjYRoPhHYe
Behavioral task
behavioral1
Sample
C.WIN_Crack.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
C.WIN_Crack.exe
-
Size
7.6MB
-
MD5
44b04397f4917fd985d60e19ee7047ee
-
SHA1
36e33d3d15c9d1316769854db23e33e448797e0d
-
SHA256
a3cf3e2f4e08aadefe6465bb9c19e30766375d778ffa0837a08ffbfd43d24fc3
-
SHA512
2d2135ca7c53e7982c9cb99c0a9091cee8a0091e252918b4507d9ada601c9aae4a32fd20fee0ceb58b86cf76e50c866a794bb83242aac6e17d1aec0016aecdf6
-
SSDEEP
196608:5ttRjurErvI9pWjgaAnajMsK2CfQCS/OinHC1e:vtRjurEUWjJjYRoPhHYe
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-