General
-
Target
Disabler
-
Size
7.5MB
-
Sample
241104-s1lp4ssbne
-
MD5
a3aead8cd0dbd2c03bf5a6b8b5b6b73d
-
SHA1
03fb8c5f2728479060249bc1f2988efe34e71499
-
SHA256
87ed23b4639c7ad635236ebeb98376a4cd24c25382e2be7d49cd5066e4b53b85
-
SHA512
ac38156a781bdceeb7975830c159327df3d92aacc6b7f9dce54294df6f971c981ad762b1475ac6d676e949e457259884ceff3491ddc9b5141c98a6c8744487b5
-
SSDEEP
196608:D7hhOourErvI9pWjg/Qc+4o673pNrabenyzWtPMYnNcsk:jrurEUWjZZ4dDLIeyzWtPTNzk
Behavioral task
behavioral1
Sample
Disabler.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
Disabler
-
Size
7.5MB
-
MD5
a3aead8cd0dbd2c03bf5a6b8b5b6b73d
-
SHA1
03fb8c5f2728479060249bc1f2988efe34e71499
-
SHA256
87ed23b4639c7ad635236ebeb98376a4cd24c25382e2be7d49cd5066e4b53b85
-
SHA512
ac38156a781bdceeb7975830c159327df3d92aacc6b7f9dce54294df6f971c981ad762b1475ac6d676e949e457259884ceff3491ddc9b5141c98a6c8744487b5
-
SSDEEP
196608:D7hhOourErvI9pWjg/Qc+4o673pNrabenyzWtPMYnNcsk:jrurEUWjZZ4dDLIeyzWtPTNzk
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-