General
-
Target
Built.exe
-
Size
6.0MB
-
Sample
241105-qekjtasejm
-
MD5
a6390ecd02872258d470f2576b37d022
-
SHA1
39c30bfe6efa1aa8b98de7191ac8cf9142a9549b
-
SHA256
2417cb81c8a42eee3f994b4f0658de3c812fa0120549e36d0ff6d5ce86b11a67
-
SHA512
81ecdf30623df4ff96d0d50f528d3e43f65946359b3021001e00e8f94b81748ab0cb161b410516aab36474f2374d76c260fbc0ad4b74bebbe03cc8ba11a3fa60
-
SSDEEP
98304:BcEtdFBCIz6LamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RxOLPtsAVeyU:BrFIIz6ueN/FJMIDJf0gsAGK4R0LPtLG
Malware Config
Targets
-
-
Target
Built.exe
-
Size
6.0MB
-
MD5
a6390ecd02872258d470f2576b37d022
-
SHA1
39c30bfe6efa1aa8b98de7191ac8cf9142a9549b
-
SHA256
2417cb81c8a42eee3f994b4f0658de3c812fa0120549e36d0ff6d5ce86b11a67
-
SHA512
81ecdf30623df4ff96d0d50f528d3e43f65946359b3021001e00e8f94b81748ab0cb161b410516aab36474f2374d76c260fbc0ad4b74bebbe03cc8ba11a3fa60
-
SSDEEP
98304:BcEtdFBCIz6LamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RxOLPtsAVeyU:BrFIIz6ueN/FJMIDJf0gsAGK4R0LPtLG
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-