General
-
Target
Built.exe
-
Size
6.0MB
-
Sample
241028-yxn9qatqav
-
MD5
d0a864a1a2eb15f019d63f34c88710b3
-
SHA1
28f49bf12bd1852102e9ff54f66529ac673e7312
-
SHA256
4bf46845f9646bb3cc2326dc27e2bb49190a7f28120237e1ee0ec50c791fac34
-
SHA512
289e4f37a027488e7bbcda6e420e7efc4bca5e2e1abb1b46177e1f4255e102b026a31e81ea169197aa3d7d3452e0381c7c654ae936d2ebeee31de3795e380b6b
-
SSDEEP
98304:fxEtdFB4tamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RvOLP9obfy3:fQFioeN/FJMIDJf0gsAGK4RGLP9A63
Malware Config
Targets
-
-
Target
Built.exe
-
Size
6.0MB
-
MD5
d0a864a1a2eb15f019d63f34c88710b3
-
SHA1
28f49bf12bd1852102e9ff54f66529ac673e7312
-
SHA256
4bf46845f9646bb3cc2326dc27e2bb49190a7f28120237e1ee0ec50c791fac34
-
SHA512
289e4f37a027488e7bbcda6e420e7efc4bca5e2e1abb1b46177e1f4255e102b026a31e81ea169197aa3d7d3452e0381c7c654ae936d2ebeee31de3795e380b6b
-
SSDEEP
98304:fxEtdFB4tamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RvOLP9obfy3:fQFioeN/FJMIDJf0gsAGK4RGLP9A63
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-