General
-
Target
a1da68589d64579861eee36d941429c59b33f527e5b5639e42cba0c97d7f1181 (1)
-
Size
4KB
-
Sample
210421-t5f8g6t9r2
-
MD5
25e566c75a0a96543265794571364d6b
-
SHA1
6f213ef7bd175a4815ce266fe8a1824a0884cf81
-
SHA256
a1da68589d64579861eee36d941429c59b33f527e5b5639e42cba0c97d7f1181
-
SHA512
294d587a88cd4504a446741acce25a547ac8b928201ddf7071996306fc40dd5a9119120f9875a798ca8caac55b71130c421a91b3bcdcc659c58f95f599ce55e2
Static task
static1
Behavioral task
behavioral1
Sample
a1da68589d64579861eee36d941429c59b33f527e5b5639e42cba0c97d7f1181 (1).vbs
Resource
win7v20210410
Behavioral task
behavioral2
Sample
a1da68589d64579861eee36d941429c59b33f527e5b5639e42cba0c97d7f1181 (1).vbs
Resource
win10v20210410
Malware Config
Extracted
https://eu.aemaccounting.com/platform.html?id=303
Targets
-
-
Target
a1da68589d64579861eee36d941429c59b33f527e5b5639e42cba0c97d7f1181 (1)
-
Size
4KB
-
MD5
25e566c75a0a96543265794571364d6b
-
SHA1
6f213ef7bd175a4815ce266fe8a1824a0884cf81
-
SHA256
a1da68589d64579861eee36d941429c59b33f527e5b5639e42cba0c97d7f1181
-
SHA512
294d587a88cd4504a446741acce25a547ac8b928201ddf7071996306fc40dd5a9119120f9875a798ca8caac55b71130c421a91b3bcdcc659c58f95f599ce55e2
Score10/10-
Blocklisted process makes network request
-
Drops file in System32 directory
-