General
-
Target
c26d2b9cca40517263c2bbaa6e990a0c
-
Size
2.8MB
-
Sample
201214-r5nxzlk4t2
-
MD5
c26d2b9cca40517263c2bbaa6e990a0c
-
SHA1
e11400714e98054da858d1afc378f7e9ef1bc27e
-
SHA256
1bfb6e94a2aa3dc20da4a8ddd84ff530dceb6cbccf6a5e7a5b14fefc2c95ba8a
-
SHA512
1a2dde8ca6a69e1afb7dd85672f395517abcbccd1ab074f7197c647e2bd2a2099cec7e830bef804fc375a0f093d9f82442f93d497c209120dac37e15a7e8bef4
Behavioral task
behavioral1
Sample
c26d2b9cca40517263c2bbaa6e990a0c.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
c26d2b9cca40517263c2bbaa6e990a0c
-
Size
2.8MB
-
MD5
c26d2b9cca40517263c2bbaa6e990a0c
-
SHA1
e11400714e98054da858d1afc378f7e9ef1bc27e
-
SHA256
1bfb6e94a2aa3dc20da4a8ddd84ff530dceb6cbccf6a5e7a5b14fefc2c95ba8a
-
SHA512
1a2dde8ca6a69e1afb7dd85672f395517abcbccd1ab074f7197c647e2bd2a2099cec7e830bef804fc375a0f093d9f82442f93d497c209120dac37e15a7e8bef4
-
ServiceHost packer
Detects ServiceHost packer used for .NET malware
-
Executes dropped EXE
-
Sets file execution options in registry
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-