General
-
Target
Built.exe
-
Size
6.9MB
-
Sample
241031-3fkx7avdpm
-
MD5
f574d54da9f3c3215ca81c9e8a921bbf
-
SHA1
194224b340906c3617f07c28315bcfd2cc635b34
-
SHA256
7c3be163067479545c59915487a0ffea6007cdc23d080e148ed63180cf13d527
-
SHA512
937db1504a059a8baa74521b50c9791fec43314d12fb4b6144c67d257d0da119b3106dbbe678d4f9fe57e95f514c1050e0d821e75d1b4b15a56433f3efca574c
-
SSDEEP
98304:eVp+DjWM8JEE1FTFxamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhD:c+0bMeNTfm/pf+xk4dWRpmrbW3jmr5
Malware Config
Targets
-
-
Target
Built.exe
-
Size
6.9MB
-
MD5
f574d54da9f3c3215ca81c9e8a921bbf
-
SHA1
194224b340906c3617f07c28315bcfd2cc635b34
-
SHA256
7c3be163067479545c59915487a0ffea6007cdc23d080e148ed63180cf13d527
-
SHA512
937db1504a059a8baa74521b50c9791fec43314d12fb4b6144c67d257d0da119b3106dbbe678d4f9fe57e95f514c1050e0d821e75d1b4b15a56433f3efca574c
-
SSDEEP
98304:eVp+DjWM8JEE1FTFxamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhD:c+0bMeNTfm/pf+xk4dWRpmrbW3jmr5
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-