General
-
Target
Built.exe
-
Size
6.9MB
-
Sample
241110-xzfvpatcpg
-
MD5
ba72313a3bd41e82bdeab6fe7f8926ad
-
SHA1
20b22242b235f43e717a41846c7b82120c08e7c5
-
SHA256
ef8ef1ae54de4bee56fa7c98d35593136468ee7e25e62934b99eda9d220365d6
-
SHA512
1c88de52a15898e1a9919c936fa6ee1f50b543b10bcd76d7d25275f371b9e603c1790465bc90a8dabbc7e37440e49faa356135d0f9db9dabc257e5e7237b4ded
-
SSDEEP
98304:W0/vITBg6ZpkamaHl3Ne4i3lqoFhTWrf9eQc0MJYzwZNqkzmas5J1n6ksB0rNHMf:WaI9pFeNlpYfMQc2sEhn6ksqO
Behavioral task
behavioral1
Sample
Built.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Built.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
����P�.pyc
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
����P�.pyc
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Built.exe
-
Size
6.9MB
-
MD5
ba72313a3bd41e82bdeab6fe7f8926ad
-
SHA1
20b22242b235f43e717a41846c7b82120c08e7c5
-
SHA256
ef8ef1ae54de4bee56fa7c98d35593136468ee7e25e62934b99eda9d220365d6
-
SHA512
1c88de52a15898e1a9919c936fa6ee1f50b543b10bcd76d7d25275f371b9e603c1790465bc90a8dabbc7e37440e49faa356135d0f9db9dabc257e5e7237b4ded
-
SSDEEP
98304:W0/vITBg6ZpkamaHl3Ne4i3lqoFhTWrf9eQc0MJYzwZNqkzmas5J1n6ksB0rNHMf:WaI9pFeNlpYfMQc2sEhn6ksqO
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
-
-
Target
����P�.pyc
-
Size
1KB
-
MD5
74cd6ab77ab939bb757ae10e036f232e
-
SHA1
2c096183677df72d0cd0d3dc8159be9930275823
-
SHA256
41df2a3c5be16805fb00f4c78bdb7c220f2e1f69220fb99a9234b263aba01264
-
SHA512
19d2c60de96b2330652a4d419535836ae63cfe8d7bf76adb91a2f5ba95757cd1bc8efcdbce46bdbf5a3d47f20faf5fa07ab62879821c220f28dff4b75ca1a874
Score1/10 -