General
-
Target
YgsT7e3.exe
-
Size
7.5MB
-
Sample
241106-zgs4eaxhql
-
MD5
447cd15038b7e48dd7b774c3e0a85525
-
SHA1
b6d6c15b6f8c1c035df15740a55dd555bb548d51
-
SHA256
6fc0a20651cdca892b2bb1fb78176ef5febf231811f824994ebe4af3e43f6171
-
SHA512
371cd81c257478171fb95059419482f46f18e82304aa9a821b3b5c19295d9bc089ec4529ae2e359173c77af6894761eea402534cd43bd4b539d3db39c298380a
-
SSDEEP
196608:EdhhOourErvI9pWjg/Qc+4o673pNrabenyzWtPMYnNcsp:WPurEUWjZZ4dDLIeyzWtPTNzp
Malware Config
Targets
-
-
Target
YgsT7e3.exe
-
Size
7.5MB
-
MD5
447cd15038b7e48dd7b774c3e0a85525
-
SHA1
b6d6c15b6f8c1c035df15740a55dd555bb548d51
-
SHA256
6fc0a20651cdca892b2bb1fb78176ef5febf231811f824994ebe4af3e43f6171
-
SHA512
371cd81c257478171fb95059419482f46f18e82304aa9a821b3b5c19295d9bc089ec4529ae2e359173c77af6894761eea402534cd43bd4b539d3db39c298380a
-
SSDEEP
196608:EdhhOourErvI9pWjg/Qc+4o673pNrabenyzWtPMYnNcsp:WPurEUWjZZ4dDLIeyzWtPTNzp
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-