General
-
Target
Perm.exe
-
Size
9.4MB
-
Sample
241029-xn9cvsxjgw
-
MD5
beed6153d14515dcbe853553f332808b
-
SHA1
a21e43654fa103c2e23da0408d62fe8bba044a8f
-
SHA256
102d4c310ae9330ae429bd2be15b3a6f0c205d8ac9a4143fb6dee7efba3ffcf0
-
SHA512
049d6c14f0c6d3c08c5a8fa7df0d83cd7650ff635ffceb6010fc6c584e87a4ef48e663910997cbcd0a97eff06c4f99aa9b71da3cfdf92a9c9a19f19ea64fc9b1
-
SSDEEP
196608:LT0Kv13cumcMIXdZeNTfm/pf+xk4dWRpmrbW3jmrs:5N3cEky/pWu4kRpmrbmyrs
Behavioral task
behavioral1
Sample
Perm.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
Perm.exe
-
Size
9.4MB
-
MD5
beed6153d14515dcbe853553f332808b
-
SHA1
a21e43654fa103c2e23da0408d62fe8bba044a8f
-
SHA256
102d4c310ae9330ae429bd2be15b3a6f0c205d8ac9a4143fb6dee7efba3ffcf0
-
SHA512
049d6c14f0c6d3c08c5a8fa7df0d83cd7650ff635ffceb6010fc6c584e87a4ef48e663910997cbcd0a97eff06c4f99aa9b71da3cfdf92a9c9a19f19ea64fc9b1
-
SSDEEP
196608:LT0Kv13cumcMIXdZeNTfm/pf+xk4dWRpmrbW3jmrs:5N3cEky/pWu4kRpmrbmyrs
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-