General
-
Target
Image Logger.exe
-
Size
7.5MB
-
Sample
241107-ljw17ayqez
-
MD5
5ba3ae17650c299807abd942a56f5bbd
-
SHA1
9b20c94fc03d0eda010c8bb8284bdc51ae3fa67b
-
SHA256
3d19e841b77cc2e5b0edc0cd4dbdf3104f83f710cf83afa8f1e84b6c3011cd10
-
SHA512
32dc03cc19836cd957d6e345a2a29e747bf61e08f4d59edb7e716a2a343a9039f60a5a1cfa1d59b081c0ac5a53a7aaa18d0f9399d383efc343e2d3d08eeaad93
-
SSDEEP
196608:76gVVECwfI9jUC2gYBYv3vbW2+iITx1U6n6:fVVEBIH2gYBgDWJTnz6
Malware Config
Targets
-
-
Target
Image Logger.exe
-
Size
7.5MB
-
MD5
5ba3ae17650c299807abd942a56f5bbd
-
SHA1
9b20c94fc03d0eda010c8bb8284bdc51ae3fa67b
-
SHA256
3d19e841b77cc2e5b0edc0cd4dbdf3104f83f710cf83afa8f1e84b6c3011cd10
-
SHA512
32dc03cc19836cd957d6e345a2a29e747bf61e08f4d59edb7e716a2a343a9039f60a5a1cfa1d59b081c0ac5a53a7aaa18d0f9399d383efc343e2d3d08eeaad93
-
SSDEEP
196608:76gVVECwfI9jUC2gYBYv3vbW2+iITx1U6n6:fVVEBIH2gYBgDWJTnz6
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-