General
-
Target
e545c5728ec3ad44feaecb13c8caac5f4b899418281ea83df17048e787dcb531.exe
-
Size
4.0MB
-
Sample
250111-gdpygazjfj
-
MD5
2eea32819c249793a43de83f9a2b93ac
-
SHA1
3e072c7633fae2f149e25b96e3b3315f94428fee
-
SHA256
e545c5728ec3ad44feaecb13c8caac5f4b899418281ea83df17048e787dcb531
-
SHA512
0c0ad3832bc2e41edf8d99577d97c011c18a9c86fd187e27ee8986f376f284316b1b78f900aa4e31a4e532151f67e9426945afd0a1433eb30a260c71e407c4b5
-
SSDEEP
49152:qT0IGMXuq88wrAyCRMMxmB/s4tx4zL3rEC3/eaQ6uQsI35UkiSOINRH:S5sNAkssuYC3bsI354SnH
Behavioral task
behavioral1
Sample
e545c5728ec3ad44feaecb13c8caac5f4b899418281ea83df17048e787dcb531.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e545c5728ec3ad44feaecb13c8caac5f4b899418281ea83df17048e787dcb531.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
darkvision
powercycle.ddns.net
Targets
-
-
Target
e545c5728ec3ad44feaecb13c8caac5f4b899418281ea83df17048e787dcb531.exe
-
Size
4.0MB
-
MD5
2eea32819c249793a43de83f9a2b93ac
-
SHA1
3e072c7633fae2f149e25b96e3b3315f94428fee
-
SHA256
e545c5728ec3ad44feaecb13c8caac5f4b899418281ea83df17048e787dcb531
-
SHA512
0c0ad3832bc2e41edf8d99577d97c011c18a9c86fd187e27ee8986f376f284316b1b78f900aa4e31a4e532151f67e9426945afd0a1433eb30a260c71e407c4b5
-
SSDEEP
49152:qT0IGMXuq88wrAyCRMMxmB/s4tx4zL3rEC3/eaQ6uQsI35UkiSOINRH:S5sNAkssuYC3bsI354SnH
Score10/10-
Darkvision family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Drops startup file
-
Executes dropped EXE
-