General
-
Target
EagleSpyV4.exe
-
Size
85.0MB
-
Sample
241103-zf13mavark
-
MD5
7b65aef9225c6278955dfd606a474191
-
SHA1
3c57314c9e2b09a95db9194682d983942e490671
-
SHA256
570de70b955d4a3e51d8386d1cccdcd5fe6ddf2a4286291edd23c2200a2deb74
-
SHA512
69af063969076a69cbbef921ee0a32f00a0bb185d3eadf9eda1d71ca37dcba5a48d22bf78bd67339482aa2bf54423fad35dcbbde556d0b586229b70b519affec
-
SSDEEP
98304:MMDjWM8JEClk1F0AKamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfFSpXq7eRpYRz:MM0ueNTfm/pf+xk4dNSESRpmrbW3jmrp
Behavioral task
behavioral1
Sample
EagleSpyV4.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
EagleSpyV4.exe
-
Size
85.0MB
-
MD5
7b65aef9225c6278955dfd606a474191
-
SHA1
3c57314c9e2b09a95db9194682d983942e490671
-
SHA256
570de70b955d4a3e51d8386d1cccdcd5fe6ddf2a4286291edd23c2200a2deb74
-
SHA512
69af063969076a69cbbef921ee0a32f00a0bb185d3eadf9eda1d71ca37dcba5a48d22bf78bd67339482aa2bf54423fad35dcbbde556d0b586229b70b519affec
-
SSDEEP
98304:MMDjWM8JEClk1F0AKamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfFSpXq7eRpYRz:MM0ueNTfm/pf+xk4dNSESRpmrbW3jmrp
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-