General
-
Target
MVPloader.exe
-
Size
7.6MB
-
Sample
241103-pl9lvawrfq
-
MD5
2400f4a5ae3cd363fc4864a8ffbf6afd
-
SHA1
4cdd65283c1cc6b3142c9111d68f3c9eaf020479
-
SHA256
c2e6d938996e5a5a3a9e724b3d828b9eccd8c60f2fa7a30af81eccdad6f0e9b3
-
SHA512
cc3e340d4c02f89c11f8a6e2f8cd9a971da98794fd13044cfd97c90c2e39de546b8793a47c3949ace8a2b983501c353c76d7abbcbd9f1b1c5271058d1721375a
-
SSDEEP
196608:CwHYT+wfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jY:+IHziK1piXLGVE4Ue0VJs
Behavioral task
behavioral1
Sample
MVPloader.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
MVPloader.exe
-
Size
7.6MB
-
MD5
2400f4a5ae3cd363fc4864a8ffbf6afd
-
SHA1
4cdd65283c1cc6b3142c9111d68f3c9eaf020479
-
SHA256
c2e6d938996e5a5a3a9e724b3d828b9eccd8c60f2fa7a30af81eccdad6f0e9b3
-
SHA512
cc3e340d4c02f89c11f8a6e2f8cd9a971da98794fd13044cfd97c90c2e39de546b8793a47c3949ace8a2b983501c353c76d7abbcbd9f1b1c5271058d1721375a
-
SSDEEP
196608:CwHYT+wfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jY:+IHziK1piXLGVE4Ue0VJs
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-