General
-
Target
QhtbqjQkwerkQM.exe
-
Size
9.4MB
-
Sample
241029-w33m7ayakj
-
MD5
3058d08d8d69deae85ded336f0d634e8
-
SHA1
e729a30da097e8d3f2a9da410f00c3a6c517dd8e
-
SHA256
4b7bd823a8689239505d1c056beee701eb575e1b7e6f43aa17878365e805e29a
-
SHA512
5cbd1f670e876d8f2627a26802a9d84a96b5401b6cc3850bf019c254182b09be891d26cc847399071cf897e745db02c323960aec625d179648fb837f8c4ea361
-
SSDEEP
196608:Fw0113cumcMIXdZeNTfm/pf+xk4dWRpmrbW3jmrx:n3cEky/pWu4kRpmrbmyrx
Malware Config
Targets
-
-
Target
QhtbqjQkwerkQM.exe
-
Size
9.4MB
-
MD5
3058d08d8d69deae85ded336f0d634e8
-
SHA1
e729a30da097e8d3f2a9da410f00c3a6c517dd8e
-
SHA256
4b7bd823a8689239505d1c056beee701eb575e1b7e6f43aa17878365e805e29a
-
SHA512
5cbd1f670e876d8f2627a26802a9d84a96b5401b6cc3850bf019c254182b09be891d26cc847399071cf897e745db02c323960aec625d179648fb837f8c4ea361
-
SSDEEP
196608:Fw0113cumcMIXdZeNTfm/pf+xk4dWRpmrbW3jmrx:n3cEky/pWu4kRpmrbmyrx
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-