General
-
Target
tz.crack.exe
-
Size
7.5MB
-
Sample
241030-wnemtaygjj
-
MD5
7a4e48717291c245f2b52d2187dca1a9
-
SHA1
6cd9fcf2b398f0c067d77758840f734d09b7448c
-
SHA256
d80cc1ce14da80e15b980438c673a1baf2beca2634eea4bb777b810474de83fd
-
SHA512
7fd9d6e3d17d2658ebe681e777373e301049b7bd4633fb6ce573e6b3fbe2871a7accef731b0b5db92abc4a10dfcc1fb020f30e467601ce0be5230bec9d5f4b90
-
SSDEEP
196608:wGgFZwfI9jUC2gYBYv3vbW5+iITm1U6fe:CFmIH2gYBgDW4TOzW
Behavioral task
behavioral1
Sample
tz.crack.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
tz.crack.exe
-
Size
7.5MB
-
MD5
7a4e48717291c245f2b52d2187dca1a9
-
SHA1
6cd9fcf2b398f0c067d77758840f734d09b7448c
-
SHA256
d80cc1ce14da80e15b980438c673a1baf2beca2634eea4bb777b810474de83fd
-
SHA512
7fd9d6e3d17d2658ebe681e777373e301049b7bd4633fb6ce573e6b3fbe2871a7accef731b0b5db92abc4a10dfcc1fb020f30e467601ce0be5230bec9d5f4b90
-
SSDEEP
196608:wGgFZwfI9jUC2gYBYv3vbW5+iITm1U6fe:CFmIH2gYBgDW4TOzW
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-