General
-
Target
loader.exe
-
Size
7.6MB
-
Sample
241029-xy7l1sydpk
-
MD5
0734f6bedc4b869ee82b9d4cccff40b5
-
SHA1
f85fad7213954af4c1e97fd8ec295edf76882095
-
SHA256
f126a99a61fbb3ea941e81fce01cd2a2d64080b33789553f94c2c6043f3b470d
-
SHA512
897794b690ab100abd0116d167e02d70089890b6b3f9091cccdec82e3bb0b1b3a5f7cc3a0ccbf6aff7f86322e09313277f3233e5879350840b0331fa55fc2ba4
-
SSDEEP
196608:IpHYLwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jC:0IHziK1piXLGVE4Ue0VJu
Malware Config
Targets
-
-
Target
loader.exe
-
Size
7.6MB
-
MD5
0734f6bedc4b869ee82b9d4cccff40b5
-
SHA1
f85fad7213954af4c1e97fd8ec295edf76882095
-
SHA256
f126a99a61fbb3ea941e81fce01cd2a2d64080b33789553f94c2c6043f3b470d
-
SHA512
897794b690ab100abd0116d167e02d70089890b6b3f9091cccdec82e3bb0b1b3a5f7cc3a0ccbf6aff7f86322e09313277f3233e5879350840b0331fa55fc2ba4
-
SSDEEP
196608:IpHYLwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jC:0IHziK1piXLGVE4Ue0VJu
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-