General
-
Target
source_prepared.exe
-
Size
80.7MB
-
Sample
250101-bt7kkayrgt
-
MD5
d19296d70e28217c223c233f2038b546
-
SHA1
0c1ce8e63b42d29d23f019921accf241c1fb69f8
-
SHA256
d8b688a860b3aa8c7a5897c99fe61bebc895a2040b72eb1574f9b8612a839b97
-
SHA512
7a3ae509a6bc5d0b309b5fdf9852f289296dc0c6f73a3854e8b574c76f4eccd9ff3c075199e3a1337ba20a344d1d0309178b97223d9776513fdb1506dfe9a335
-
SSDEEP
1572864:ZGKlDWjysmwSk8IpG7V+VPhqFiE7BbliEoiYgj+h58sMw+DBZN:wK51smwSkB05awFVwE656t
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
80.7MB
-
MD5
d19296d70e28217c223c233f2038b546
-
SHA1
0c1ce8e63b42d29d23f019921accf241c1fb69f8
-
SHA256
d8b688a860b3aa8c7a5897c99fe61bebc895a2040b72eb1574f9b8612a839b97
-
SHA512
7a3ae509a6bc5d0b309b5fdf9852f289296dc0c6f73a3854e8b574c76f4eccd9ff3c075199e3a1337ba20a344d1d0309178b97223d9776513fdb1506dfe9a335
-
SSDEEP
1572864:ZGKlDWjysmwSk8IpG7V+VPhqFiE7BbliEoiYgj+h58sMw+DBZN:wK51smwSkB05awFVwE656t
Score8/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-