General
-
Target
N4HACKS.exe
-
Size
6.8MB
-
Sample
241230-xpvk4awqby
-
MD5
145698b0336f40a4c8fd70e2bf2f8052
-
SHA1
cbb42a8e502705de50cbe1d2d775337c149dc7df
-
SHA256
d12d11b00b8e2cf64abd777ed326d22aa6dd829581fd16d171546f1e9c87d416
-
SHA512
2af47cc7d67f9988bc3ef72b3087197fa651c5544f0c9aa3c58360496c4db0078f0176e1c2c34047c48c40838b634c6090cbb9ad84e77b44cdf53dada9299d43
-
SSDEEP
196608:hyV1va2B6ylnlPzf+JiJCsmFMvQn6hqgdhx:6a2BRlnlPSa7mmvQpgdhx
Behavioral task
behavioral1
Sample
N4HACKS.exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
s�"���.pyc
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
N4HACKS.exe
-
Size
6.8MB
-
MD5
145698b0336f40a4c8fd70e2bf2f8052
-
SHA1
cbb42a8e502705de50cbe1d2d775337c149dc7df
-
SHA256
d12d11b00b8e2cf64abd777ed326d22aa6dd829581fd16d171546f1e9c87d416
-
SHA512
2af47cc7d67f9988bc3ef72b3087197fa651c5544f0c9aa3c58360496c4db0078f0176e1c2c34047c48c40838b634c6090cbb9ad84e77b44cdf53dada9299d43
-
SSDEEP
196608:hyV1va2B6ylnlPzf+JiJCsmFMvQn6hqgdhx:6a2BRlnlPSa7mmvQpgdhx
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Enumerates processes with tasklist
-
-
-
Target
s�"���.pyc
-
Size
1KB
-
MD5
20b0e90d82fc82706f90f4e13894ae82
-
SHA1
1e5872cb410115a6a6b31ae8ee4709175b6bcbd8
-
SHA256
a40644fbb4b8b6029bb03d772a2a8bdd8679caaca55daa619a9e9405ec57e90c
-
SHA512
7d87135f7cd156b7db2f47cb5f86412ab1067b21c52326e9025f4d2b7eab02417de64ec1903c10569e76084ce50809ecc04ae9fbcf920cd2d203669a85f88cfb
Score1/10 -