General
-
Target
Built.exe
-
Size
8.4MB
-
Sample
241121-2lrggsymex
-
MD5
ab0c18c1152d24e36df057b6630330dc
-
SHA1
4fd504eb196439de1d918151b82f7a472a42df45
-
SHA256
f5a3409e62770b9769d8edd41c840257542bf338a0e4718616e217e4a6c41fe3
-
SHA512
9c17d6077a3f8659e01ca46f6aa06a49a4cb6e2db059de9fab1a5bcbfd074105ecd60243b97da75095f60b02f8a3d6eff2f0eac08fd3cbdf8a53d12454c32187
-
SSDEEP
196608:3Dg0UwfI9jUC2gYBYv3vbWz9q//zsLe9j3lt:c0rIH2gYBgDWU/7sLkzlt
Behavioral task
behavioral1
Sample
Built.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
Built.exe
-
Size
8.4MB
-
MD5
ab0c18c1152d24e36df057b6630330dc
-
SHA1
4fd504eb196439de1d918151b82f7a472a42df45
-
SHA256
f5a3409e62770b9769d8edd41c840257542bf338a0e4718616e217e4a6c41fe3
-
SHA512
9c17d6077a3f8659e01ca46f6aa06a49a4cb6e2db059de9fab1a5bcbfd074105ecd60243b97da75095f60b02f8a3d6eff2f0eac08fd3cbdf8a53d12454c32187
-
SSDEEP
196608:3Dg0UwfI9jUC2gYBYv3vbWz9q//zsLe9j3lt:c0rIH2gYBgDWU/7sLkzlt
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-