General
-
Target
haveSimpleAnd.dll
-
Size
454KB
-
Sample
210721-5mcyj2sxr2
-
MD5
fdd1d81128f8fe9022d3cd6ae0f08bf1
-
SHA1
25f03defe490c9cc8455a0216e626217ca19abe5
-
SHA256
1e26ec8397bdc7b7b6ffb3169dbeb7f16ce8bd2d80398ccb0edcbd7b189d639e
-
SHA512
c3186b17f5b49b1c1d9ce102c227aa384e1a829f0e8bd682977a9bbad6b32e148b99f98f965a0608cf5d37914d8ac76d1308c3ca3c2fded7af48575bf69d70f1
Static task
static1
Behavioral task
behavioral1
Sample
haveSimpleAnd.dll
Resource
win7v20210408
Behavioral task
behavioral2
Sample
haveSimpleAnd.dll
Resource
win10v20210410
Malware Config
Targets
-
-
Target
haveSimpleAnd.dll
-
Size
454KB
-
MD5
fdd1d81128f8fe9022d3cd6ae0f08bf1
-
SHA1
25f03defe490c9cc8455a0216e626217ca19abe5
-
SHA256
1e26ec8397bdc7b7b6ffb3169dbeb7f16ce8bd2d80398ccb0edcbd7b189d639e
-
SHA512
c3186b17f5b49b1c1d9ce102c227aa384e1a829f0e8bd682977a9bbad6b32e148b99f98f965a0608cf5d37914d8ac76d1308c3ca3c2fded7af48575bf69d70f1
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-