General
-
Target
projectera.exe
-
Size
76.6MB
-
Sample
241205-y27xmazpbv
-
MD5
35cbd72c4ea08b56481431df776568d1
-
SHA1
2873a8d688b886097fb321bf7f03d6e412eb085b
-
SHA256
2115cc224c45992e5d6797da69498b9712f7ba7afb94d6053ecd7a7560b6d987
-
SHA512
8426d9986d1617ee45fa17b958ceb5e218debcb339ee0ebc217480ba7d0399459bad85ebb2aa00aaa70bfc5ae78905bd67394073af404af042311d39f1a20f74
-
SSDEEP
1572864:91l92WfmUSk8IpG7V+VPhqb+TUE7Tlhe7fEYiYweyJulZUdgRI6XPwfzmDtaJS:91KMmUSkB05awb+TVLPhpulvXztao
Behavioral task
behavioral1
Sample
projectera.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
projectera.exe
-
Size
76.6MB
-
MD5
35cbd72c4ea08b56481431df776568d1
-
SHA1
2873a8d688b886097fb321bf7f03d6e412eb085b
-
SHA256
2115cc224c45992e5d6797da69498b9712f7ba7afb94d6053ecd7a7560b6d987
-
SHA512
8426d9986d1617ee45fa17b958ceb5e218debcb339ee0ebc217480ba7d0399459bad85ebb2aa00aaa70bfc5ae78905bd67394073af404af042311d39f1a20f74
-
SSDEEP
1572864:91l92WfmUSk8IpG7V+VPhqb+TUE7Tlhe7fEYiYweyJulZUdgRI6XPwfzmDtaJS:91KMmUSkB05awb+TVLPhpulvXztao
Score8/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-