General
-
Target
TEST.exe
-
Size
6.9MB
-
Sample
241128-kef9ha1rfv
-
MD5
7100e5417306c8387eb2d50dea73c09d
-
SHA1
da375b670279c2948ce6c5052f9f4f344a892abf
-
SHA256
c7b92bbcd228bc59048c9190b2d94d293972f6b0e566d77a1a5b10f352cb9217
-
SHA512
c5f052ca4c7eb235e0bd6e83ff8149799af9533d25f90b7553a853dce1ff9be6f0643c6d920041bd63265d1688702a115fa3aca545c26544563fd94470b252cc
-
SSDEEP
98304:aKDjWM8JEE1FEamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEIFWW:aK0TeNTfm/pf+xk4dWRpmrbW3jmrr
Behavioral task
behavioral1
Sample
TEST.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
TEST.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
TEST.exe
-
Size
6.9MB
-
MD5
7100e5417306c8387eb2d50dea73c09d
-
SHA1
da375b670279c2948ce6c5052f9f4f344a892abf
-
SHA256
c7b92bbcd228bc59048c9190b2d94d293972f6b0e566d77a1a5b10f352cb9217
-
SHA512
c5f052ca4c7eb235e0bd6e83ff8149799af9533d25f90b7553a853dce1ff9be6f0643c6d920041bd63265d1688702a115fa3aca545c26544563fd94470b252cc
-
SSDEEP
98304:aKDjWM8JEE1FEamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEIFWW:aK0TeNTfm/pf+xk4dWRpmrbW3jmrr
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1