General
-
Target
Saturno Duper V2.exe
-
Size
8.3MB
-
Sample
241103-zl5m1awrbj
-
MD5
3333853951c399841f8c1a0322c95a27
-
SHA1
714917ffd18ab25dec43b01f3be388ff435626cb
-
SHA256
90e2ee8d265667ca0618d55e5e7d223745a230c4a77c5901698e8205264f1065
-
SHA512
be08f781e31b677b85b86cf23a582a23c7c867940521b612ed28cd35436b94895a100f4af5291b94060e37044734043390f94ac09ac05bead9d5c5518f7f6f9d
-
SSDEEP
196608:tPgJ0VEYwfI9jUC2gYBYv3vbW4SEf+iITx1U6nL:uKVEHIH2gYBgDWZjTnzL
Behavioral task
behavioral1
Sample
Saturno Duper V2.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
Saturno Duper V2.exe
-
Size
8.3MB
-
MD5
3333853951c399841f8c1a0322c95a27
-
SHA1
714917ffd18ab25dec43b01f3be388ff435626cb
-
SHA256
90e2ee8d265667ca0618d55e5e7d223745a230c4a77c5901698e8205264f1065
-
SHA512
be08f781e31b677b85b86cf23a582a23c7c867940521b612ed28cd35436b94895a100f4af5291b94060e37044734043390f94ac09ac05bead9d5c5518f7f6f9d
-
SSDEEP
196608:tPgJ0VEYwfI9jUC2gYBYv3vbW4SEf+iITx1U6nL:uKVEHIH2gYBgDWZjTnzL
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-