General
-
Target
Built.exe
-
Size
6.0MB
-
Sample
241029-p7skfswran
-
MD5
41cb920d7fa5aed46820086641d53731
-
SHA1
a373754c02dc269cc380152f8231109c7bdf01a9
-
SHA256
a42c68fe69b216f425e374613a373a834298e366645b7b0cd1ffab7a7d6cab91
-
SHA512
879aedcaf0f24883bd9221f257ac39ab7bef8dcd01053034b7a96d9a3f6c2fc51ebf4002bc647f143b7acadb579dd4c270d8850736091334e6b169d0db397713
-
SSDEEP
98304:W0EtdFBCIFTamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RzOLPH4n88fT:WjFIIFWeN/FJMIDJf0gsAGK4RyLPHx87
Malware Config
Targets
-
-
Target
Built.exe
-
Size
6.0MB
-
MD5
41cb920d7fa5aed46820086641d53731
-
SHA1
a373754c02dc269cc380152f8231109c7bdf01a9
-
SHA256
a42c68fe69b216f425e374613a373a834298e366645b7b0cd1ffab7a7d6cab91
-
SHA512
879aedcaf0f24883bd9221f257ac39ab7bef8dcd01053034b7a96d9a3f6c2fc51ebf4002bc647f143b7acadb579dd4c270d8850736091334e6b169d0db397713
-
SSDEEP
98304:W0EtdFBCIFTamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RzOLPH4n88fT:WjFIIFWeN/FJMIDJf0gsAGK4RyLPHx87
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-