General
-
Target
Tz project.exe
-
Size
6.9MB
-
Sample
241125-wmqcxswjcj
-
MD5
92ea203e11878696a095f97152787819
-
SHA1
3c63797a3f5bb2e0fec848280088ffc0f2ccdf42
-
SHA256
2ea709882e02d8408ba71752de2dd16d8d66ffe956906337fcf9388bd964cff2
-
SHA512
e209357dc0116d718b2351c9ce7d17025922329b140f6d856553574a444abcde80eee5b19fe6451c38076f05e0e2b9791df91bf83cbd52bd954e4d0b4001c56a
-
SSDEEP
196608:ilMRV1v2B6ylnlPzf+JiJCsmFMvln6hqgO:oa2BRlnlPSa7mmvlpgO
Behavioral task
behavioral1
Sample
Tz project.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
Tz project.exe
-
Size
6.9MB
-
MD5
92ea203e11878696a095f97152787819
-
SHA1
3c63797a3f5bb2e0fec848280088ffc0f2ccdf42
-
SHA256
2ea709882e02d8408ba71752de2dd16d8d66ffe956906337fcf9388bd964cff2
-
SHA512
e209357dc0116d718b2351c9ce7d17025922329b140f6d856553574a444abcde80eee5b19fe6451c38076f05e0e2b9791df91bf83cbd52bd954e4d0b4001c56a
-
SSDEEP
196608:ilMRV1v2B6ylnlPzf+JiJCsmFMvln6hqgO:oa2BRlnlPSa7mmvlpgO
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-