General
-
Target
b2a0ba46ee84e4488233748cdc72c407d6ef1accde653d2297a9fac7c5bdf8feN
-
Size
6.0MB
-
Sample
241106-g1v31awdrn
-
MD5
bf5f922943db620d9886a075dfb375f0
-
SHA1
674f422cf4c1db2793257b0546a50eaf02d2abee
-
SHA256
b2a0ba46ee84e4488233748cdc72c407d6ef1accde653d2297a9fac7c5bdf8fe
-
SHA512
537630d62546c47b5571f8555184f63be94912d258dbe570f73a06cbe5cacca1b9f69fee6ddd21c5c97d76830622d3dc22eed25ef78d01220954eba2881af71e
-
SSDEEP
98304:e/EtdFBgw7amaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4R1PMEZ3GMZT+:eOF8eN/FJMIDJf0gsAGK4R1kETZT+
Behavioral task
behavioral1
Sample
b2a0ba46ee84e4488233748cdc72c407d6ef1accde653d2297a9fac7c5bdf8feN.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
b2a0ba46ee84e4488233748cdc72c407d6ef1accde653d2297a9fac7c5bdf8feN
-
Size
6.0MB
-
MD5
bf5f922943db620d9886a075dfb375f0
-
SHA1
674f422cf4c1db2793257b0546a50eaf02d2abee
-
SHA256
b2a0ba46ee84e4488233748cdc72c407d6ef1accde653d2297a9fac7c5bdf8fe
-
SHA512
537630d62546c47b5571f8555184f63be94912d258dbe570f73a06cbe5cacca1b9f69fee6ddd21c5c97d76830622d3dc22eed25ef78d01220954eba2881af71e
-
SSDEEP
98304:e/EtdFBgw7amaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4R1PMEZ3GMZT+:eOF8eN/FJMIDJf0gsAGK4R1kETZT+
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-