General
-
Target
Built.exe
-
Size
6.9MB
-
Sample
241030-qr7j4svbnk
-
MD5
e876252404837ba49897faa048762c81
-
SHA1
39a408228999f4f18ebb890d5417ed6118a6d8da
-
SHA256
af47a29761bf74b3c78795c61a0a165e0ec4134d2561343df42798dcdb32297c
-
SHA512
d2f83d0d2fe190bb7ad338ab6c5ce1f837cb08b40e1325e12941da0fbdd248d05b7f6baca55b519d3d115d69d0e1e34faa563b8fff41e406342688144f684279
-
SSDEEP
98304:qRDjWM8JEE1FVHamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEIFY:qR0bqeNTfm/pf+xk4dWRpmrbW3jmrg
Behavioral task
behavioral1
Sample
Built.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
Built.exe
-
Size
6.9MB
-
MD5
e876252404837ba49897faa048762c81
-
SHA1
39a408228999f4f18ebb890d5417ed6118a6d8da
-
SHA256
af47a29761bf74b3c78795c61a0a165e0ec4134d2561343df42798dcdb32297c
-
SHA512
d2f83d0d2fe190bb7ad338ab6c5ce1f837cb08b40e1325e12941da0fbdd248d05b7f6baca55b519d3d115d69d0e1e34faa563b8fff41e406342688144f684279
-
SSDEEP
98304:qRDjWM8JEE1FVHamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEIFY:qR0bqeNTfm/pf+xk4dWRpmrbW3jmrg
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-