General
-
Target
AIO.exe
-
Size
7.6MB
-
Sample
250118-mwmhys1lgt
-
MD5
0d49bc0688632e3baafc053f81fae52c
-
SHA1
5c46d123ed6a5b30bf29f9003e4a2bfcaafe7b51
-
SHA256
785ec7bfd5410ec975a10bf335557354686c4d3de26aedabefc0913f4ba1b76f
-
SHA512
97163263b09a90f4e88295dd59f3fb15693b76d97dbe8e3fa7deae231236b46d9824c3276cde3ca281aeab52176b5dd2f8e31c22057edf406c54e258cb5cdece
-
SSDEEP
196608:7HV1Fc6ZB6ylnlPzf+JiJCsmFMveOn6hqgdhI:NcSBRlnlPSa7mmveOpgdhI
Behavioral task
behavioral1
Sample
AIO.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
AIO.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
�b$�i��.pyc
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
�b$�i��.pyc
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
AIO.exe
-
Size
7.6MB
-
MD5
0d49bc0688632e3baafc053f81fae52c
-
SHA1
5c46d123ed6a5b30bf29f9003e4a2bfcaafe7b51
-
SHA256
785ec7bfd5410ec975a10bf335557354686c4d3de26aedabefc0913f4ba1b76f
-
SHA512
97163263b09a90f4e88295dd59f3fb15693b76d97dbe8e3fa7deae231236b46d9824c3276cde3ca281aeab52176b5dd2f8e31c22057edf406c54e258cb5cdece
-
SSDEEP
196608:7HV1Fc6ZB6ylnlPzf+JiJCsmFMveOn6hqgdhI:NcSBRlnlPSa7mmveOpgdhI
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
-
-
Target
�b$�i��.pyc
-
Size
1KB
-
MD5
88b98453e34aaa9acf514b42026ee46c
-
SHA1
91c8146efc2a93ba01c6797442e6e1347fd9e153
-
SHA256
95ca7cb5481be571c5b24fb4a4412d1a063d2abfe56f785873f3473ad2ed36f8
-
SHA512
2535d2965cb5ee104006528da779f4834a3c6f855008b5ed7eeda1295b3ea6a6b248398806667a6bb35914d9f5f71dfbb583f3513314ecd45a984c183263afcc
Score1/10 -