General
-
Target
32626327474272.exe
-
Size
25.0MB
-
Sample
250208-ql7mxsymcl
-
MD5
61205f1b286e003d454604f262796515
-
SHA1
79c91b2fa72e2ff5ef2aede68843c99cbed6ce28
-
SHA256
8279de6ed3e59bac2f3aa33a81361b245bae0125b1fbc80f4323e5f2f60afc06
-
SHA512
d9aca65a9160b1f45d29f0eeaa0866d47392b7ae30e17d846bd33e944f53ca882b98ad883be0fe8a4b50edcc0ecca867a65dfdfcc6f7dea571be1eda59604645
-
SSDEEP
98304:x9DjWM8JEE1F+amaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRiYRJJcGhEIFWe:x90FeNTfm/pf+xk4dWRimrbW3jmy4
Behavioral task
behavioral1
Sample
32626327474272.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
32626327474272.exe
-
Size
25.0MB
-
MD5
61205f1b286e003d454604f262796515
-
SHA1
79c91b2fa72e2ff5ef2aede68843c99cbed6ce28
-
SHA256
8279de6ed3e59bac2f3aa33a81361b245bae0125b1fbc80f4323e5f2f60afc06
-
SHA512
d9aca65a9160b1f45d29f0eeaa0866d47392b7ae30e17d846bd33e944f53ca882b98ad883be0fe8a4b50edcc0ecca867a65dfdfcc6f7dea571be1eda59604645
-
SSDEEP
98304:x9DjWM8JEE1F+amaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRiYRJJcGhEIFWe:x90FeNTfm/pf+xk4dWRimrbW3jmy4
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-