General
-
Target
Perm.exe
-
Size
6.9MB
-
Sample
241029-xsa1vsxkcv
-
MD5
e8592a7609f5895d3a5237b31951a7fb
-
SHA1
05b9cb9ac8f7dcd84fd17ad63c0db3c913a8bac3
-
SHA256
a1e165909e125f9e8e2266304d012f6d23e6d09953917c00b72cd7cd1279919c
-
SHA512
0a1c7ed6c3c1f4e5871a9f7a407798b953bd219090681a248737e7a174b8c4643a7dc71039d012f01664a0c591a109d9bd308887f1f1d4cd21144e5d399c7279
-
SSDEEP
98304:vVp9DjWM8JEE1FCamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEIL:r90ReNTfm/pf+xk4dWRpmrbW3jmrJ
Behavioral task
behavioral1
Sample
Perm.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
Perm.exe
-
Size
6.9MB
-
MD5
e8592a7609f5895d3a5237b31951a7fb
-
SHA1
05b9cb9ac8f7dcd84fd17ad63c0db3c913a8bac3
-
SHA256
a1e165909e125f9e8e2266304d012f6d23e6d09953917c00b72cd7cd1279919c
-
SHA512
0a1c7ed6c3c1f4e5871a9f7a407798b953bd219090681a248737e7a174b8c4643a7dc71039d012f01664a0c591a109d9bd308887f1f1d4cd21144e5d399c7279
-
SSDEEP
98304:vVp9DjWM8JEE1FCamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEIL:r90ReNTfm/pf+xk4dWRpmrbW3jmrJ
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-