General
-
Target
Built.exe
-
Size
8.2MB
-
Sample
250114-dbpyxaxjhr
-
MD5
2a6f831ae5bf9c87d9ab9e13ea8a44b0
-
SHA1
a65b63ca6492fe87fea30c0692ce12acf8f42c12
-
SHA256
f369b199d697c429062ce6dc0bf92eaa19d0ab4bbd2cd0b090d4b15b28c28eef
-
SHA512
29898248be3591d805be9d4000442c226836518fd580b7ddf9ce7b81433d05928355fdb40f40e3cdbb17362a29241d46ac66c92f7998c32fe9050a1bfbe53049
-
SSDEEP
196608:ADRkdewfI9jUCBB7m+mKOY7rXrZu6SELooDmhfvsbnTNWD:AaLIHL7HmBYXrkRoaUNQ
Behavioral task
behavioral1
Sample
Built.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
Built.exe
-
Size
8.2MB
-
MD5
2a6f831ae5bf9c87d9ab9e13ea8a44b0
-
SHA1
a65b63ca6492fe87fea30c0692ce12acf8f42c12
-
SHA256
f369b199d697c429062ce6dc0bf92eaa19d0ab4bbd2cd0b090d4b15b28c28eef
-
SHA512
29898248be3591d805be9d4000442c226836518fd580b7ddf9ce7b81433d05928355fdb40f40e3cdbb17362a29241d46ac66c92f7998c32fe9050a1bfbe53049
-
SSDEEP
196608:ADRkdewfI9jUCBB7m+mKOY7rXrZu6SELooDmhfvsbnTNWD:AaLIHL7HmBYXrkRoaUNQ
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-