General
-
Target
Built.exe
-
Size
6.0MB
-
Sample
241103-vhrjrasjbl
-
MD5
b03ba1ee6252c3c532d8b5222b09b99a
-
SHA1
68e066dca79dd5698ea5051d40111e4d108cf778
-
SHA256
ffe2a479e0e59d1325a0f360db84478a2d4a46099ddc37f6e4f39670d33f000e
-
SHA512
bd944d3d763d822bfa825ae789640ec3bd2b763559e970a0bcef90a0c3902c6a6ee1cef6a9b545546f696544e43b331122af430a046bc4445a2e6553088b5c6b
-
SSDEEP
98304:2gEtdFBCIcgJamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RWOLPnb71Ry7:2HFIIcgEeN/FJMIDJf0gsAGK4RlLPnNq
Behavioral task
behavioral1
Sample
Built.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
Built.exe
-
Size
6.0MB
-
MD5
b03ba1ee6252c3c532d8b5222b09b99a
-
SHA1
68e066dca79dd5698ea5051d40111e4d108cf778
-
SHA256
ffe2a479e0e59d1325a0f360db84478a2d4a46099ddc37f6e4f39670d33f000e
-
SHA512
bd944d3d763d822bfa825ae789640ec3bd2b763559e970a0bcef90a0c3902c6a6ee1cef6a9b545546f696544e43b331122af430a046bc4445a2e6553088b5c6b
-
SSDEEP
98304:2gEtdFBCIcgJamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RWOLPnb71Ry7:2HFIIcgEeN/FJMIDJf0gsAGK4RlLPnNq
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-