General
-
Target
Malware - Worms Stealers.rar
-
Size
168.3MB
-
Sample
241116-wz6knszqdx
-
MD5
4c63f98f13b259e874649862c0d8c62c
-
SHA1
3ef03e2a41670ed405c5fac932cb89308f6a0c9b
-
SHA256
70596a9d443eb12afe1d74356ddff517283229f7bdee768bcd301de7103caee2
-
SHA512
915ca74279e74ddb80d0aab1b21423836b2c642488634a668fa6be77aead47d084350abb17937b069093a5caeefcb8d8597b74cea3b33b362e76695f9f6720f6
-
SSDEEP
3145728:Y146FwUJywUzYYsHTuI20c01UiaPhFuZeOKtqx:Y2QDyRYYYTDl+fztptu
Behavioral task
behavioral1
Sample
Malware - Worms Stealers.rar
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
Malware - Worms Stealers.rar
-
Size
168.3MB
-
MD5
4c63f98f13b259e874649862c0d8c62c
-
SHA1
3ef03e2a41670ed405c5fac932cb89308f6a0c9b
-
SHA256
70596a9d443eb12afe1d74356ddff517283229f7bdee768bcd301de7103caee2
-
SHA512
915ca74279e74ddb80d0aab1b21423836b2c642488634a668fa6be77aead47d084350abb17937b069093a5caeefcb8d8597b74cea3b33b362e76695f9f6720f6
-
SSDEEP
3145728:Y146FwUJywUzYYsHTuI20c01UiaPhFuZeOKtqx:Y2QDyRYYYTDl+fztptu
Score8/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-