General
-
Target
$R2SL635.exe
-
Size
7.5MB
-
Sample
241029-mkyf3svrhp
-
MD5
f7dbd6f4631eda20d33ac81347609b04
-
SHA1
253852eacadf66d5907e789cd0378ca9b30c0025
-
SHA256
e9fa9576000941de5affa155585ef9afe9373700ae7e3d36cc2491ff3fd9b81b
-
SHA512
67b29b20b3a32780209dec7b7bca602e53c7a78f071402466977c5fbf8d5ba692db396d9b1be4c30e918de8b305e50015f092eaad9a360f963a432b3458056f4
-
SSDEEP
196608:iSmDaeNHXOvJTSRHvUWvozWOxu9kXwvdbDlA03NIhnWDUMihUi:dGZdOMRHdKbAlbZA036hWDoV
Behavioral task
behavioral1
Sample
$R2SL635.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
$R2SL635.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
$R2SL635.exe
-
Size
7.5MB
-
MD5
f7dbd6f4631eda20d33ac81347609b04
-
SHA1
253852eacadf66d5907e789cd0378ca9b30c0025
-
SHA256
e9fa9576000941de5affa155585ef9afe9373700ae7e3d36cc2491ff3fd9b81b
-
SHA512
67b29b20b3a32780209dec7b7bca602e53c7a78f071402466977c5fbf8d5ba692db396d9b1be4c30e918de8b305e50015f092eaad9a360f963a432b3458056f4
-
SSDEEP
196608:iSmDaeNHXOvJTSRHvUWvozWOxu9kXwvdbDlA03NIhnWDUMihUi:dGZdOMRHdKbAlbZA036hWDoV
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-