General
-
Target
N4HACKS.exe
-
Size
6.8MB
-
Sample
241230-xntbmstpbr
-
MD5
145698b0336f40a4c8fd70e2bf2f8052
-
SHA1
cbb42a8e502705de50cbe1d2d775337c149dc7df
-
SHA256
d12d11b00b8e2cf64abd777ed326d22aa6dd829581fd16d171546f1e9c87d416
-
SHA512
2af47cc7d67f9988bc3ef72b3087197fa651c5544f0c9aa3c58360496c4db0078f0176e1c2c34047c48c40838b634c6090cbb9ad84e77b44cdf53dada9299d43
-
SSDEEP
196608:hyV1va2B6ylnlPzf+JiJCsmFMvQn6hqgdhx:6a2BRlnlPSa7mmvQpgdhx
Malware Config
Targets
-
-
Target
N4HACKS.exe
-
Size
6.8MB
-
MD5
145698b0336f40a4c8fd70e2bf2f8052
-
SHA1
cbb42a8e502705de50cbe1d2d775337c149dc7df
-
SHA256
d12d11b00b8e2cf64abd777ed326d22aa6dd829581fd16d171546f1e9c87d416
-
SHA512
2af47cc7d67f9988bc3ef72b3087197fa651c5544f0c9aa3c58360496c4db0078f0176e1c2c34047c48c40838b634c6090cbb9ad84e77b44cdf53dada9299d43
-
SSDEEP
196608:hyV1va2B6ylnlPzf+JiJCsmFMvQn6hqgdhx:6a2BRlnlPSa7mmvQpgdhx
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Enumerates processes with tasklist
-