General
-
Target
OOO Tochka
-
Size
198KB
-
Sample
210217-xbsbsbsyks
-
MD5
de602f032c362bdc1440d7a92874cd6f
-
SHA1
2682a13d58b90bbeeb722e5494924f86d083ff90
-
SHA256
b58f6d597c88e79bb34ee776227be235121b7a0f6b99170ff57ff66a96a940ed
-
SHA512
a33f99cc8d3af10a4341002a45f3f5055c29442dd05bccb1e705dcb6f01781964bc2048b15c05b871909289706c59a6df2b15ff14e5ec9d6069358844614a12f
Static task
static1
Behavioral task
behavioral1
Sample
OOO Tochka.exe
Resource
win7v20201028
Malware Config
Extracted
amadey
2.11
185.215.113.17/jG3cs2rP/index.php
Targets
-
-
Target
OOO Tochka
-
Size
198KB
-
MD5
de602f032c362bdc1440d7a92874cd6f
-
SHA1
2682a13d58b90bbeeb722e5494924f86d083ff90
-
SHA256
b58f6d597c88e79bb34ee776227be235121b7a0f6b99170ff57ff66a96a940ed
-
SHA512
a33f99cc8d3af10a4341002a45f3f5055c29442dd05bccb1e705dcb6f01781964bc2048b15c05b871909289706c59a6df2b15ff14e5ec9d6069358844614a12f
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-