General
-
Target
4656271903064064.zip
-
Size
15KB
-
Sample
210813-fsap535z56
-
MD5
960e1829953f37fe1727b72768c4542c
-
SHA1
9d8bf8d231c936b3272ca78d5f0b97f5ca953e3d
-
SHA256
f429131538f77d63756e8faa49219785c2b845c79c6ad621bebd6ab88a10e7e2
-
SHA512
3eb9feb0c23f043d6ef084044eac30f1ff52616a8a3969cebda0fc17d05d2f7cfaaeddba74b95d1bea3da12df7f7055949a4b765b36c3c175db0c0da020a0ecd
Static task
static1
Behavioral task
behavioral1
Sample
e9f9a434fead41ebc2113ea330a6a0461c9d99c808852f94c6dfa3cd1a1af822.exe
Resource
win7v20210408
Malware Config
Extracted
systembc
bookingswarfaces.com:4035
bookingswarfacesec.com:4035
Targets
-
-
Target
e9f9a434fead41ebc2113ea330a6a0461c9d99c808852f94c6dfa3cd1a1af822
-
Size
30KB
-
MD5
e568e52939c93b06ae050223ae4645c5
-
SHA1
b390b43d557a2364c8848ec598850cb5d4bc5a1b
-
SHA256
e9f9a434fead41ebc2113ea330a6a0461c9d99c808852f94c6dfa3cd1a1af822
-
SHA512
edcade4cab931b87bf5f347e57807f37bd5fb6ef90e132a59e84f82a853c4a1ca3413cbe0e31cb18952dd971b0fbd92a34f416607152beefc9d0e868105ebaa3
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Uses Tor communications
Malware can proxy its traffic through Tor for more anonymity.
-