General
-
Target
quantity.exe
-
Size
6.0MB
-
Sample
250202-sdlrlaynbk
-
MD5
cec9c7e4aa0ad42e85e9a1f0c5af4900
-
SHA1
cac7dc79666782ccf81dc8a70590c271fdeabaa3
-
SHA256
6dfa5b6c96eaa63893952a7954ecd9c2a791a03cbbef75273528f5a126927711
-
SHA512
f23ae22dd0d6e866132481185f80302af65de62d14d0a408befd3c4388130ae5a1837e0d233d6f7434a747668f6c7e104d657d85bb1697d742609473fe06bbd3
-
SSDEEP
98304:X4EtdFByLPamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RvOnAKZOl9fYy3:X/FELSeN/FJMIDJf0gsAGK4RGnAKZC9D
Behavioral task
behavioral1
Sample
quantity.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral2
Sample
quantity.exe
Resource
win10ltsc2021-20250128-en
Behavioral task
behavioral3
Sample
quantity.exe
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
�g3~�.pyc
Resource
win10v2004-20250129-en
Behavioral task
behavioral5
Sample
�g3~�.pyc
Resource
win10ltsc2021-20250128-en
Behavioral task
behavioral6
Sample
�g3~�.pyc
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
quantity.exe
-
Size
6.0MB
-
MD5
cec9c7e4aa0ad42e85e9a1f0c5af4900
-
SHA1
cac7dc79666782ccf81dc8a70590c271fdeabaa3
-
SHA256
6dfa5b6c96eaa63893952a7954ecd9c2a791a03cbbef75273528f5a126927711
-
SHA512
f23ae22dd0d6e866132481185f80302af65de62d14d0a408befd3c4388130ae5a1837e0d233d6f7434a747668f6c7e104d657d85bb1697d742609473fe06bbd3
-
SSDEEP
98304:X4EtdFByLPamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RvOnAKZOl9fYy3:X/FELSeN/FJMIDJf0gsAGK4RGnAKZC9D
-
Deletes Windows Defender Definitions
Uses mpcmdrun utility to delete all AV definitions.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
-
-
Target
�g3~�.pyc
-
Size
857B
-
MD5
a084e76e6fb8a922d0b11ca296a04a60
-
SHA1
fe59cd983663f6dc4ba934e82008761f0864cd6d
-
SHA256
75356f19eeee5eed1596145c60ad984e37a968b66c46624a63fb377828c9b547
-
SHA512
4edc2793500332917898d2615224a6734b97c09a3bf9771f825bb23e369bf7265f8520ecedbea94cd572a87b4d6cdf431e3b9c77d3f306533a30ba5ea2f6b5d1
Score1/10 -