General
-
Target
3NTR.exe
-
Size
6.9MB
-
Sample
241121-z5e7fsxqdw
-
MD5
e77433c584b36796be6ec317c441de17
-
SHA1
3996ad4fee577840a0bdb685a1a99d3b9461f12d
-
SHA256
9306e15177375464956beb499a1ebc25aeeb1cd6436ce906fddae20112cd995a
-
SHA512
04392eb1aab33889bea70eba71432815b7739270a9c88b35b9080f1fd9e34761e242c72ebbfeefe9e9280a51c07fdc56bd057be1990edffec40f856992fdf544
-
SSDEEP
98304:v/DjWM8JEE1FWsamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEIFV:v/0INeNTfm/pf+xk4dWRpmrbW3jmrN
Malware Config
Targets
-
-
Target
3NTR.exe
-
Size
6.9MB
-
MD5
e77433c584b36796be6ec317c441de17
-
SHA1
3996ad4fee577840a0bdb685a1a99d3b9461f12d
-
SHA256
9306e15177375464956beb499a1ebc25aeeb1cd6436ce906fddae20112cd995a
-
SHA512
04392eb1aab33889bea70eba71432815b7739270a9c88b35b9080f1fd9e34761e242c72ebbfeefe9e9280a51c07fdc56bd057be1990edffec40f856992fdf544
-
SSDEEP
98304:v/DjWM8JEE1FWsamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEIFV:v/0INeNTfm/pf+xk4dWRpmrbW3jmrN
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-