General
-
Target
e292bc9462fa6eae3a43bf9753a493422b907105e0fefc849f2e4e5ab73c7cf7.exe
-
Size
6.0MB
-
Sample
241101-gskx3ayall
-
MD5
e520eedb426f94a03b27bc439a428a12
-
SHA1
6ea6027ec15ca1c2ca8723b40abe8abf5934b677
-
SHA256
e292bc9462fa6eae3a43bf9753a493422b907105e0fefc849f2e4e5ab73c7cf7
-
SHA512
e05220bbe5938e6ee4c16e8619d7d9578a69ac549f8152e2d2d96c6a86d790b0a7d831130a71f10e01e03109cb867dd37c8df8fd8c9dca0937ab837b5a03e43d
-
SSDEEP
98304:wJEtdFBB7MamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RYPMGr3mMGg:wIFj7teN/FJMIDJf0gsAGK4RYkGJGg
Behavioral task
behavioral1
Sample
e292bc9462fa6eae3a43bf9753a493422b907105e0fefc849f2e4e5ab73c7cf7.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
e292bc9462fa6eae3a43bf9753a493422b907105e0fefc849f2e4e5ab73c7cf7.exe
-
Size
6.0MB
-
MD5
e520eedb426f94a03b27bc439a428a12
-
SHA1
6ea6027ec15ca1c2ca8723b40abe8abf5934b677
-
SHA256
e292bc9462fa6eae3a43bf9753a493422b907105e0fefc849f2e4e5ab73c7cf7
-
SHA512
e05220bbe5938e6ee4c16e8619d7d9578a69ac549f8152e2d2d96c6a86d790b0a7d831130a71f10e01e03109cb867dd37c8df8fd8c9dca0937ab837b5a03e43d
-
SSDEEP
98304:wJEtdFBB7MamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RYPMGr3mMGg:wIFj7teN/FJMIDJf0gsAGK4RYkGJGg
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-