General
-
Target
Build.exe
-
Size
7.4MB
-
Sample
241105-xbeygsvrhw
-
MD5
11ba08c713728d87b6b24ff2d56f2e2d
-
SHA1
0fbba08f74d6a2c2a4cef62cdae1801e136fd714
-
SHA256
5bb370892b98e7a3cd66e1d26b8bea344011bea0b3565dd7b2a69adc0be05f8b
-
SHA512
104d360e45296ab9f2681a4e3f187526c6ff0f165eb495f5e84a3fbdd4c7caa6765dbd6e7073f72371282b2691002a924ead5b12f278aa0c4c2f9d2e5c69cbd3
-
SSDEEP
196608:hD8PeLjv+bhqNVoB0SEsucQZ41JBbIEs1LQ:F8PiL+9qz80SJHQK1J9shQ
Malware Config
Targets
-
-
Target
Build.exe
-
Size
7.4MB
-
MD5
11ba08c713728d87b6b24ff2d56f2e2d
-
SHA1
0fbba08f74d6a2c2a4cef62cdae1801e136fd714
-
SHA256
5bb370892b98e7a3cd66e1d26b8bea344011bea0b3565dd7b2a69adc0be05f8b
-
SHA512
104d360e45296ab9f2681a4e3f187526c6ff0f165eb495f5e84a3fbdd4c7caa6765dbd6e7073f72371282b2691002a924ead5b12f278aa0c4c2f9d2e5c69cbd3
-
SSDEEP
196608:hD8PeLjv+bhqNVoB0SEsucQZ41JBbIEs1LQ:F8PiL+9qz80SJHQK1J9shQ
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-