General
-
Target
NexusFiveM.zip
-
Size
7.6MB
-
Sample
250210-nydjhazlfn
-
MD5
c2054a9d1afb4539237720949c77da10
-
SHA1
0ad2fe6d71bb9c1f7f93974711957f60336a3b9d
-
SHA256
8d347ae2354b8e5e89fe1423c55b67d7d3b27f280b71187c89cc3a6b62ee74ff
-
SHA512
188c12313abb0cb5888e1dee155aac4813c284c232d63c04550342773fa62a76ec21ba0cddfbf363d0c14cd2eaa9a47316ddfff2f65fb0050bc69a1dac4c47f1
-
SSDEEP
196608:0LRgFWwfI9jUC2gYBYv3vbWY+iITm1U6fd1Ed:8yFdIH2gYBgDW/TOzbO
Behavioral task
behavioral1
Sample
NexusFiveM/NexusFiveM.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
NexusFiveM/NexusFiveM.exe
-
Size
7.6MB
-
MD5
4e4b715046fa491f2566949a8323fb78
-
SHA1
335060ed70f4ee3471cd2ddce245e57e623e109a
-
SHA256
8d847a8e298457cd0f8f249457ee75ca62f1a73a39a0748841eda05eb99f8fcf
-
SHA512
9970f79ddc60a7bcd14c0de9f56091fd0d7033f533774f728a1cf1ceef15e9cebb3a7777b9ad17c5ce3fd12ec9bcd80d7fbdc387f279743af87d6d0fa8077845
-
SSDEEP
196608:TLRgFWwfI9jUC2gYBYv3vbWY+iITm1U6fd1Ed:PyFdIH2gYBgDW/TOzb6
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-