General
-
Target
Velocity.exe
-
Size
8.3MB
-
Sample
241128-2c9ayaynam
-
MD5
cde93f66d271110134b9527fc2ce91a8
-
SHA1
fe576b05427450d42c3c433fea808196f9a55645
-
SHA256
a5f1000ac65b4423eda0fff42184b531abf7d1d30904c7b7a27fbf52f1139e1c
-
SHA512
eaaf7641b446883902cb70ce2e5a71c78de65858d3746e8cc73650a33ad548876711f5d5aad36d148b4a93d4f19dafad2ce7b9915d55b15be1fb93a8a5af9175
-
SSDEEP
196608:XWuYucwfI9jUCzi4H1qSiXLGVi7DMgpZASEyQ0VMwICEc/jt:vIHziK1piXLGVE4UrS0VJJ
Behavioral task
behavioral1
Sample
Velocity.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
Velocity.exe
-
Size
8.3MB
-
MD5
cde93f66d271110134b9527fc2ce91a8
-
SHA1
fe576b05427450d42c3c433fea808196f9a55645
-
SHA256
a5f1000ac65b4423eda0fff42184b531abf7d1d30904c7b7a27fbf52f1139e1c
-
SHA512
eaaf7641b446883902cb70ce2e5a71c78de65858d3746e8cc73650a33ad548876711f5d5aad36d148b4a93d4f19dafad2ce7b9915d55b15be1fb93a8a5af9175
-
SSDEEP
196608:XWuYucwfI9jUCzi4H1qSiXLGVi7DMgpZASEyQ0VMwICEc/jt:vIHziK1piXLGVE4UrS0VJJ
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-