General
-
Target
36221d1de17c912aec12db0155e17ba91b268ec4891d4ef5d592cf03d4c5ff79
-
Size
7.5MB
-
Sample
241104-z6lqmaxjbw
-
MD5
807f3c82e4fd6a4eb94cd4fba6d06619
-
SHA1
3e7f8c2f439e0e0c376ec38a992a63e088dcaf5a
-
SHA256
36221d1de17c912aec12db0155e17ba91b268ec4891d4ef5d592cf03d4c5ff79
-
SHA512
79fdb321ab0f5e4f7cd180b422bf2600bbab74d988d98c316723e381026b982a54e1d1e2659084006c214065d60663301c1dfdb919ec5c38497551bd6e65820d
-
SSDEEP
196608:F5gVVEDwfI9jUC2gYBYv3vbW2+iITx1U6ni:UVVEwIH2gYBgDWJTnzi
Behavioral task
behavioral1
Sample
36221d1de17c912aec12db0155e17ba91b268ec4891d4ef5d592cf03d4c5ff79.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
36221d1de17c912aec12db0155e17ba91b268ec4891d4ef5d592cf03d4c5ff79
-
Size
7.5MB
-
MD5
807f3c82e4fd6a4eb94cd4fba6d06619
-
SHA1
3e7f8c2f439e0e0c376ec38a992a63e088dcaf5a
-
SHA256
36221d1de17c912aec12db0155e17ba91b268ec4891d4ef5d592cf03d4c5ff79
-
SHA512
79fdb321ab0f5e4f7cd180b422bf2600bbab74d988d98c316723e381026b982a54e1d1e2659084006c214065d60663301c1dfdb919ec5c38497551bd6e65820d
-
SSDEEP
196608:F5gVVEDwfI9jUC2gYBYv3vbW2+iITx1U6ni:UVVEwIH2gYBgDWJTnzi
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-