General
-
Target
7XA4B_Built.exe
-
Size
6.9MB
-
Sample
241105-a3bzkszngv
-
MD5
ddef356f6044f342bba9598f9dab5be1
-
SHA1
5172cf3208d09717bf1653465ae255681310d01c
-
SHA256
b92e18fbfaf4962596ef95c7b94f7e1963d3a2847877e690ad55e3332d079504
-
SHA512
2ccabb8d1d885829e97c7ac5f8f6f3a2f9da193a9010984d69f8d05067066606a2bef1ca76a02471bbc0b59afeeb7965909c4b293bb32426567f8a10f23de80c
-
SSDEEP
98304:xwDjWM8JEE1F57VamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEIu:xw0YeNTfm/pf+xk4dWRpmrbW3jmro
Behavioral task
behavioral1
Sample
7XA4B_Built.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
7XA4B_Built.exe
-
Size
6.9MB
-
MD5
ddef356f6044f342bba9598f9dab5be1
-
SHA1
5172cf3208d09717bf1653465ae255681310d01c
-
SHA256
b92e18fbfaf4962596ef95c7b94f7e1963d3a2847877e690ad55e3332d079504
-
SHA512
2ccabb8d1d885829e97c7ac5f8f6f3a2f9da193a9010984d69f8d05067066606a2bef1ca76a02471bbc0b59afeeb7965909c4b293bb32426567f8a10f23de80c
-
SSDEEP
98304:xwDjWM8JEE1F57VamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEIu:xw0YeNTfm/pf+xk4dWRpmrbW3jmro
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Loads dropped DLL
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-