General
-
Target
NIGGERSLAVE.exe
-
Size
7.1MB
-
Sample
250118-y5qshssrht
-
MD5
fc811f5134e5a18bae65f1eb6c4bc7e6
-
SHA1
e21f484b51ab71e67299a12b82c178e85385cf88
-
SHA256
2c974529f0ba6cf41aca2de5cafee8cd89d080cb41c6e1a4e41302b4c86c6c07
-
SHA512
eb51a95103f24c6a982a02e03c66b54a9fed91a5d1e2105494d731600bef30b52eb4e04421357c4955c50ef356bc7375a7624608696c38efb53d2802655a695a
-
SSDEEP
98304:uuCIfhvpj/q12MMD/x/0feyGgatbQ940BDlgwdnpka9R/k9t+2SzIrzUGt+otMew:uHOpj/WSDfyGgqwBdnpkYRMsc81e8yN6
Behavioral task
behavioral1
Sample
NIGGERSLAVE.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
NIGGERSLAVE.exe
-
Size
7.1MB
-
MD5
fc811f5134e5a18bae65f1eb6c4bc7e6
-
SHA1
e21f484b51ab71e67299a12b82c178e85385cf88
-
SHA256
2c974529f0ba6cf41aca2de5cafee8cd89d080cb41c6e1a4e41302b4c86c6c07
-
SHA512
eb51a95103f24c6a982a02e03c66b54a9fed91a5d1e2105494d731600bef30b52eb4e04421357c4955c50ef356bc7375a7624608696c38efb53d2802655a695a
-
SSDEEP
98304:uuCIfhvpj/q12MMD/x/0feyGgatbQ940BDlgwdnpka9R/k9t+2SzIrzUGt+otMew:uHOpj/WSDfyGgqwBdnpkYRMsc81e8yN6
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-