General
-
Target
Himlaya.exe
-
Size
7.9MB
-
Sample
241030-sx6k4sxpdr
-
MD5
7bc92b7d2a17e8146cb87ad23c2a1faf
-
SHA1
d52c9191452b988e4da8fc40150d63993edb6927
-
SHA256
4117707c37c95adb3b2610a7406f3814ba37aa1ea396a1a359c3d52a33b01813
-
SHA512
77fb9b573f94ab4994cff1162b4b5191ef7090b5c0c5c73d0d6a3c0451b706c9bea6cfcc62bfc9fc590b4829749ac860e2ef002387a2c4a1f1ec73d9d86c47a0
-
SSDEEP
196608:sTHYMwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jU:dIHziK1piXLGVE4Ue0VJA
Behavioral task
behavioral1
Sample
Himlaya.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
Himlaya.exe
-
Size
7.9MB
-
MD5
7bc92b7d2a17e8146cb87ad23c2a1faf
-
SHA1
d52c9191452b988e4da8fc40150d63993edb6927
-
SHA256
4117707c37c95adb3b2610a7406f3814ba37aa1ea396a1a359c3d52a33b01813
-
SHA512
77fb9b573f94ab4994cff1162b4b5191ef7090b5c0c5c73d0d6a3c0451b706c9bea6cfcc62bfc9fc590b4829749ac860e2ef002387a2c4a1f1ec73d9d86c47a0
-
SSDEEP
196608:sTHYMwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jU:dIHziK1piXLGVE4Ue0VJA
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-