General
-
Target
f8e6d9646bf17d37f2aad9f5b82212f90f67b886.exe
-
Size
123KB
-
Sample
210420-vp6qchbh6n
-
MD5
4f0abd7211e5bcb49a92591158d4d231
-
SHA1
f8e6d9646bf17d37f2aad9f5b82212f90f67b886
-
SHA256
b11f8065c37558a54799f1965283968f05754cd63328560148f59d54ed77351c
-
SHA512
3e5369dfd10eee1c0f456cd7aa94e095d289f9895f67046df25cac5294b7d6dde897fdc59425c8cd75c61ef6285ef5b645bc7a5f2d5de6b7f6a174bac70ee8fc
Static task
static1
Behavioral task
behavioral1
Sample
f8e6d9646bf17d37f2aad9f5b82212f90f67b886.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
f8e6d9646bf17d37f2aad9f5b82212f90f67b886.exe
Resource
win10v20210410
Malware Config
Targets
-
-
Target
f8e6d9646bf17d37f2aad9f5b82212f90f67b886.exe
-
Size
123KB
-
MD5
4f0abd7211e5bcb49a92591158d4d231
-
SHA1
f8e6d9646bf17d37f2aad9f5b82212f90f67b886
-
SHA256
b11f8065c37558a54799f1965283968f05754cd63328560148f59d54ed77351c
-
SHA512
3e5369dfd10eee1c0f456cd7aa94e095d289f9895f67046df25cac5294b7d6dde897fdc59425c8cd75c61ef6285ef5b645bc7a5f2d5de6b7f6a174bac70ee8fc
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Deletes itself
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-