General
-
Target
source_prepared.exe
-
Size
82.3MB
-
Sample
250126-1s14tswrgl
-
MD5
ae89c50ad94817cf7bc5d3e26f790689
-
SHA1
1e9c3d7d249a6b3a9042a5108f384d53eee97073
-
SHA256
ecac0c4dfa465334bb9984703195d13b5dca81dbfcebf7b6286da78f42678e13
-
SHA512
3792df826dece6ab41f19fae1f0cbae2181deea93ab5f011a5a6c8225f8191f867ab5c6c5bc146ee081e81ed8231ef1d4beb584b6609aa52526d2830701e30ad
-
SSDEEP
1572864:GbVl1xWQomDOkiqOv8im2AsUE7WSlKiRiY4MHHLeqPNLtDSvZZgDX:GpdnomDOknOv8i3lASMiOMHVLt2voT
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
source_prepared.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
82.3MB
-
MD5
ae89c50ad94817cf7bc5d3e26f790689
-
SHA1
1e9c3d7d249a6b3a9042a5108f384d53eee97073
-
SHA256
ecac0c4dfa465334bb9984703195d13b5dca81dbfcebf7b6286da78f42678e13
-
SHA512
3792df826dece6ab41f19fae1f0cbae2181deea93ab5f011a5a6c8225f8191f867ab5c6c5bc146ee081e81ed8231ef1d4beb584b6609aa52526d2830701e30ad
-
SSDEEP
1572864:GbVl1xWQomDOkiqOv8im2AsUE7WSlKiRiY4MHHLeqPNLtDSvZZgDX:GpdnomDOknOv8i3lASMiOMHVLt2voT
Score8/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-