Resubmissions

03-08-2021 22:25

210803-eh6fpq7nss 10

03-11-2020 07:53

201103-gb8g1j9lta 7

Analysis

  • max time kernel
    135s
  • max time network
    145s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    03-08-2021 22:25

General

  • Target

    7b1d3afeac807486a9d7e830e145199be7e075b8be9d31f1ffff20acc34cab16.bin.exe

  • Size

    268KB

  • MD5

    5888d244355019117d6d855408aa5372

  • SHA1

    7a645ea747ad528f2191660228d84ec11b3c3497

  • SHA256

    7b1d3afeac807486a9d7e830e145199be7e075b8be9d31f1ffff20acc34cab16

  • SHA512

    a004df2a012f1713f0fa03ea82256354f88658781a6e06791c85f8298af21fb3a4de7f42193841e0c9d229351ba7c81dc532865aeeefd737ec7202a17e5aeb95

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b1d3afeac807486a9d7e830e145199be7e075b8be9d31f1ffff20acc34cab16.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\7b1d3afeac807486a9d7e830e145199be7e075b8be9d31f1ffff20acc34cab16.bin.exe"
    1⤵
      PID:1832

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads