General
-
Target
SerialsChanger.exe
-
Size
6.9MB
-
Sample
241101-19156avjdv
-
MD5
58f1a3ce29c18eed6d7d8d025d667fc2
-
SHA1
b7df7b2e0bc7f4bd5a7b3e0d9458d4c2f0e3a541
-
SHA256
47656121cbe5896b91e0ed07d887d0bb595bd1dd06d87611fa5cd8369c0161ec
-
SHA512
68a1cbe6c3df827a1ed30ead67b402d4799c215f54ba6649590ce0069ede722b67541c8c764211ed09196638785809e51a04898c35b0be2a41200d53978b5e79
-
SSDEEP
98304:+VpZDjWM8JEE1FzPYamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhH:8Z0RxeNTfm/pf+xk4dWRpmrbW3jmrJ
Malware Config
Targets
-
-
Target
SerialsChanger.exe
-
Size
6.9MB
-
MD5
58f1a3ce29c18eed6d7d8d025d667fc2
-
SHA1
b7df7b2e0bc7f4bd5a7b3e0d9458d4c2f0e3a541
-
SHA256
47656121cbe5896b91e0ed07d887d0bb595bd1dd06d87611fa5cd8369c0161ec
-
SHA512
68a1cbe6c3df827a1ed30ead67b402d4799c215f54ba6649590ce0069ede722b67541c8c764211ed09196638785809e51a04898c35b0be2a41200d53978b5e79
-
SSDEEP
98304:+VpZDjWM8JEE1FzPYamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhH:8Z0RxeNTfm/pf+xk4dWRpmrbW3jmrJ
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-