General
-
Target
Vanish (3).exe
-
Size
9.5MB
-
Sample
241029-cbcsxazngy
-
MD5
c0a0a8dc4be717b74303ac71b31b2e96
-
SHA1
3f8392ba34324f254099ec8ad2d79360594b650a
-
SHA256
4aa7e625c9587fc1170d0203e36285e0fffdbbe945032dc3bc7116063ad30d9a
-
SHA512
41cb3fbbce4b6ade8093ec807a597709cbf88241f2fcae86fea8f2ab71deb93a0a2c96059a67d46af2febbb4080a810e18cfa84508b4e060885b1d7b87fb2e10
-
SSDEEP
196608:/pgaywNRQlgwfI9jUC2gYBYv3vbW4SEB+itP3D2X371C:yaybl/IH2gYBgDWZ4vDE3pC
Malware Config
Targets
-
-
Target
Vanish (3).exe
-
Size
9.5MB
-
MD5
c0a0a8dc4be717b74303ac71b31b2e96
-
SHA1
3f8392ba34324f254099ec8ad2d79360594b650a
-
SHA256
4aa7e625c9587fc1170d0203e36285e0fffdbbe945032dc3bc7116063ad30d9a
-
SHA512
41cb3fbbce4b6ade8093ec807a597709cbf88241f2fcae86fea8f2ab71deb93a0a2c96059a67d46af2febbb4080a810e18cfa84508b4e060885b1d7b87fb2e10
-
SSDEEP
196608:/pgaywNRQlgwfI9jUC2gYBYv3vbW4SEB+itP3D2X371C:yaybl/IH2gYBgDWZ4vDE3pC
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-