General
-
Target
5m redengine tracers blocker.exe
-
Size
6.0MB
-
Sample
250116-zc2vraymcr
-
MD5
27d20b07fa1bbacf14e9fed3c7a4c726
-
SHA1
d28d71bfa9747d4fbafb2ece41292fb2949d7dc6
-
SHA256
7063954b61b528c121e2f92c88a10ae8d32d050197db36cd173c8639db403ca4
-
SHA512
c1a97da1ff97a3a723c893b0bb08db52d67d986abe255c8739663fac460aee5db274bb3e508fda5f5a5869e2bdac1437ca757b50207e2a06ec2a921fccdf91c4
-
SSDEEP
98304:c1Iu4+DcdxiamaHl3Ne4i3gDUZnhhM7M+yvFaW9cIzaF6ARwDtyDe2HmMm63UoMl:cKp+Dm1eNoInY7/sHfbRy9ZmvWDQKT+
Behavioral task
behavioral1
Sample
5m redengine tracers blocker.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
5m redengine tracers blocker.exe
-
Size
6.0MB
-
MD5
27d20b07fa1bbacf14e9fed3c7a4c726
-
SHA1
d28d71bfa9747d4fbafb2ece41292fb2949d7dc6
-
SHA256
7063954b61b528c121e2f92c88a10ae8d32d050197db36cd173c8639db403ca4
-
SHA512
c1a97da1ff97a3a723c893b0bb08db52d67d986abe255c8739663fac460aee5db274bb3e508fda5f5a5869e2bdac1437ca757b50207e2a06ec2a921fccdf91c4
-
SSDEEP
98304:c1Iu4+DcdxiamaHl3Ne4i3gDUZnhhM7M+yvFaW9cIzaF6ARwDtyDe2HmMm63UoMl:cKp+Dm1eNoInY7/sHfbRy9ZmvWDQKT+
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-