General
-
Target
source_prepared.exe
-
Size
80.7MB
-
Sample
241231-2wntcatmdz
-
MD5
c7e8e8a2b377c3eebd02f2a25f7159d0
-
SHA1
488073cc736f62dc770ed13273bb730272bc3e36
-
SHA256
14eb28d0c0ae0e8e26371288e066e382581f8588b6959a4c8a12c538bbdb9485
-
SHA512
06338b542343c8c14e84d13f97adb7c1ab7ae951be71a2a574216818496b419f73f573a19afdd73da1a56abcd6b4434e617405f724cd4206c23361af37cb9ebb
-
SSDEEP
1572864:oGKlDWjysmwSk8IpG7V+VPhqFiE7BbliEoiYgj+h58sMw+DBZN:hK51smwSkB05awFVwE656t
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
80.7MB
-
MD5
c7e8e8a2b377c3eebd02f2a25f7159d0
-
SHA1
488073cc736f62dc770ed13273bb730272bc3e36
-
SHA256
14eb28d0c0ae0e8e26371288e066e382581f8588b6959a4c8a12c538bbdb9485
-
SHA512
06338b542343c8c14e84d13f97adb7c1ab7ae951be71a2a574216818496b419f73f573a19afdd73da1a56abcd6b4434e617405f724cd4206c23361af37cb9ebb
-
SSDEEP
1572864:oGKlDWjysmwSk8IpG7V+VPhqFiE7BbliEoiYgj+h58sMw+DBZN:hK51smwSkB05awFVwE656t
Score8/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-