General
-
Target
frostware.exe
-
Size
7.5MB
-
Sample
250207-gslvcs1pd1
-
MD5
fa1fc6261866e132f5cf1c65a1eaae06
-
SHA1
4bbaef311e6e863c4e1988e7650d3bd8d74da776
-
SHA256
235bdd78b2ac3d2347cc8f91bfe5a7133719a648720fd484bb2dd768ea4782f4
-
SHA512
b2f4e3d00124710fac12a195f6ba66ede0c61cc492254eda577e13e6bba667ba3107269a8959cd79c03ef042994343cb779c39c7e32087ad5973c8ff8ab0b41e
-
SSDEEP
196608:8PQCwVdururErvI9pWjgN3ZdahF0pbH1AY7WtQsNo/03vC1y:HV4rurEUWjqeWx06rYYy
Behavioral task
behavioral1
Sample
frostware.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
frostware.exe
-
Size
7.5MB
-
MD5
fa1fc6261866e132f5cf1c65a1eaae06
-
SHA1
4bbaef311e6e863c4e1988e7650d3bd8d74da776
-
SHA256
235bdd78b2ac3d2347cc8f91bfe5a7133719a648720fd484bb2dd768ea4782f4
-
SHA512
b2f4e3d00124710fac12a195f6ba66ede0c61cc492254eda577e13e6bba667ba3107269a8959cd79c03ef042994343cb779c39c7e32087ad5973c8ff8ab0b41e
-
SSDEEP
196608:8PQCwVdururErvI9pWjgN3ZdahF0pbH1AY7WtQsNo/03vC1y:HV4rurEUWjqeWx06rYYy
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-