General
-
Target
e8eea442e148c81f116de31b4fc3d0aa725c5dbbbd840b446a3fb9793d0b9f26
-
Size
7.8MB
-
Sample
210618-g2yqf53nnj
-
MD5
39d550fd902ca4c1461961d01ad1aeb6
-
SHA1
cae1d0d39e4341c924c21509007852d093c57c91
-
SHA256
e8eea442e148c81f116de31b4fc3d0aa725c5dbbbd840b446a3fb9793d0b9f26
-
SHA512
9b30d65d00d2690a71c306a0f44d654db2b068449b43bac4d05c7d425ac52e091f7c2e8df7c5f1e7eabe5ada0e609bff4aa00dfcd7c03e4a6101c5e6f584c993
Static task
static1
Behavioral task
behavioral1
Sample
e8eea442e148c81f116de31b4fc3d0aa725c5dbbbd840b446a3fb9793d0b9f26.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
e8eea442e148c81f116de31b4fc3d0aa725c5dbbbd840b446a3fb9793d0b9f26.exe
Resource
win10v20210408
Malware Config
Targets
-
-
Target
e8eea442e148c81f116de31b4fc3d0aa725c5dbbbd840b446a3fb9793d0b9f26
-
Size
7.8MB
-
MD5
39d550fd902ca4c1461961d01ad1aeb6
-
SHA1
cae1d0d39e4341c924c21509007852d093c57c91
-
SHA256
e8eea442e148c81f116de31b4fc3d0aa725c5dbbbd840b446a3fb9793d0b9f26
-
SHA512
9b30d65d00d2690a71c306a0f44d654db2b068449b43bac4d05c7d425ac52e091f7c2e8df7c5f1e7eabe5ada0e609bff4aa00dfcd7c03e4a6101c5e6f584c993
Score10/10-
Klingon RAT Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-