General
-
Target
TD.premiumbeta.exe
-
Size
7.4MB
-
Sample
241029-nw5j7stngz
-
MD5
92be1111700fb7aa292c3802ad821847
-
SHA1
f0972a23e67ccdf7d3f107f199a881af177e69b2
-
SHA256
82d90e090e6f565dd9f98771b6b264bb6cd16787615636767dd07e50b5194a31
-
SHA512
f50d581c83c46869e6d0bf585f0e8a8348d84e95ba778bcf8dbae4d6dca06324367dbeab5b2fac3124b5a3a13d93d6fd872ccbdc79e8af3b5525f5ef6c704964
-
SSDEEP
98304:+Vp5IMc3urErvz81LpWjjUlLkvzgXO9hAlaYrzzuJZYJ1JIuIyKU78bcgPowNMs:8QurErvI9pWjgyvoaYrE41JIuIzoO9
Behavioral task
behavioral1
Sample
TD.premiumbeta.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
TD.premiumbeta.exe
-
Size
7.4MB
-
MD5
92be1111700fb7aa292c3802ad821847
-
SHA1
f0972a23e67ccdf7d3f107f199a881af177e69b2
-
SHA256
82d90e090e6f565dd9f98771b6b264bb6cd16787615636767dd07e50b5194a31
-
SHA512
f50d581c83c46869e6d0bf585f0e8a8348d84e95ba778bcf8dbae4d6dca06324367dbeab5b2fac3124b5a3a13d93d6fd872ccbdc79e8af3b5525f5ef6c704964
-
SSDEEP
98304:+Vp5IMc3urErvz81LpWjjUlLkvzgXO9hAlaYrzzuJZYJ1JIuIyKU78bcgPowNMs:8QurErvI9pWjgyvoaYrE41JIuIzoO9
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-