General
-
Target
Loader.exe
-
Size
10.0MB
-
Sample
250104-3cpf7ssnhz
-
MD5
2c2442a79fa52676f059c00d8147996f
-
SHA1
fae8af8b7e96c8848abbb129f903837b88f22a9a
-
SHA256
b2f93bda5c451f7a5f30d019fb79c8071afa22ae169905d782eb8278234c5e12
-
SHA512
66c4e17ed26fbe8ea1ea41fd157a2811d6feda77f469b3219b0d04f42af66a34772efd46d63216d55250d9844575c352a792253c1e2d73f50d4c752870781b1e
-
SSDEEP
98304:ASDjWM8JEE1FJbswamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEb:AS07sReNTfm/pf+xk4dWRpmrbW3jmru
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Loader.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Loader.exe
-
Size
10.0MB
-
MD5
2c2442a79fa52676f059c00d8147996f
-
SHA1
fae8af8b7e96c8848abbb129f903837b88f22a9a
-
SHA256
b2f93bda5c451f7a5f30d019fb79c8071afa22ae169905d782eb8278234c5e12
-
SHA512
66c4e17ed26fbe8ea1ea41fd157a2811d6feda77f469b3219b0d04f42af66a34772efd46d63216d55250d9844575c352a792253c1e2d73f50d4c752870781b1e
-
SSDEEP
98304:ASDjWM8JEE1FJbswamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEb:AS07sReNTfm/pf+xk4dWRpmrbW3jmru
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-