General
-
Target
plasmadiwness.exe
-
Size
8.4MB
-
Sample
241030-z7kjysspgj
-
MD5
0d3cd19db4ec192aaf4b7a8bcdf3af16
-
SHA1
ba27b65ae0a87dc4478585560a579d3bd2e5b47e
-
SHA256
4dc68228313866d8c5b838282eb100909ab546cf742f0420c5d955830eca4c5d
-
SHA512
5571ebd88f45440acfedbd9a3dab8473881556346c78ee04b741a29ed75a74406de3c88b8767db9d107aa67c9fd5ee51f0a95f9597f6d0dbb447e33982a54076
-
SSDEEP
196608:t/yY/YCwfI9jUCzi4H1qSiXLGVi7DMgpZ7vQ0VMwICEc/j:09IHziK1piXLGVE4UhY0VJ
Malware Config
Targets
-
-
Target
plasmadiwness.exe
-
Size
8.4MB
-
MD5
0d3cd19db4ec192aaf4b7a8bcdf3af16
-
SHA1
ba27b65ae0a87dc4478585560a579d3bd2e5b47e
-
SHA256
4dc68228313866d8c5b838282eb100909ab546cf742f0420c5d955830eca4c5d
-
SHA512
5571ebd88f45440acfedbd9a3dab8473881556346c78ee04b741a29ed75a74406de3c88b8767db9d107aa67c9fd5ee51f0a95f9597f6d0dbb447e33982a54076
-
SSDEEP
196608:t/yY/YCwfI9jUCzi4H1qSiXLGVi7DMgpZ7vQ0VMwICEc/j:09IHziK1piXLGVE4UhY0VJ
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-