General
-
Target
turankyserchets.exe
-
Size
7.8MB
-
Sample
250415-xqpfgawtby
-
MD5
94dd93a1e09594567ba2f0bc1af13927
-
SHA1
3d32ca71a96033eb2f9bfe18d9ae7eceea1d1951
-
SHA256
79bdb910cdbac46bd809d30d00fbffbc4ec040e1149db4e3bd2675bfc7f1cfef
-
SHA512
e03268ad5a8f23eb2ddaa0a7488b26291360dc5ad52500f4e058ca90be61c8f91e4d61a3e4bbcac3331b6c53dafd6b827b5a60d653a40a0d593ea6aaa818fde8
-
SSDEEP
196608:KW5HUOXXKApTj9fZwQRCgiIKpdzjPOan7j2y283TOnOt:dxBw8wIKppDO9it
Behavioral task
behavioral1
Sample
turankyserchets.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
turankyserchets.exe
-
Size
7.8MB
-
MD5
94dd93a1e09594567ba2f0bc1af13927
-
SHA1
3d32ca71a96033eb2f9bfe18d9ae7eceea1d1951
-
SHA256
79bdb910cdbac46bd809d30d00fbffbc4ec040e1149db4e3bd2675bfc7f1cfef
-
SHA512
e03268ad5a8f23eb2ddaa0a7488b26291360dc5ad52500f4e058ca90be61c8f91e4d61a3e4bbcac3331b6c53dafd6b827b5a60d653a40a0d593ea6aaa818fde8
-
SSDEEP
196608:KW5HUOXXKApTj9fZwQRCgiIKpdzjPOan7j2y283TOnOt:dxBw8wIKppDO9it
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-