General
-
Target
Video tool.exe
-
Size
7.5MB
-
Sample
241030-q66alavcmg
-
MD5
6a4cdfa563d9e187d86e3f95345af036
-
SHA1
5319190f5f82b9bfbf15ced2d3f8eea777aa5f46
-
SHA256
86cde2d508fd21a8bc6b07be3a4aecdc1b0ea403535b38a4f59bba82c0d7172d
-
SHA512
e225d7ad74845fe8dfaa2e0ad9f721f80df8701d051ccb8585078e2fcdc13c18b536c62a2e6da72bf1629d400c5e6c2815a09cd3afcea868c3b768397df56228
-
SSDEEP
196608:dkgFbcpwfI9jUC2gYBYv3vbW5+iITm1U6fl:TFbTIH2gYBgDW4TOzd
Behavioral task
behavioral1
Sample
Video tool.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
Video tool.exe
-
Size
7.5MB
-
MD5
6a4cdfa563d9e187d86e3f95345af036
-
SHA1
5319190f5f82b9bfbf15ced2d3f8eea777aa5f46
-
SHA256
86cde2d508fd21a8bc6b07be3a4aecdc1b0ea403535b38a4f59bba82c0d7172d
-
SHA512
e225d7ad74845fe8dfaa2e0ad9f721f80df8701d051ccb8585078e2fcdc13c18b536c62a2e6da72bf1629d400c5e6c2815a09cd3afcea868c3b768397df56228
-
SSDEEP
196608:dkgFbcpwfI9jUC2gYBYv3vbW5+iITm1U6fl:TFbTIH2gYBgDW4TOzd
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-