General
-
Target
Requerimiento.exe
-
Size
166KB
-
Sample
210818-98znv3maaa
-
MD5
4c8b8d244f471478ad5c6bb4babb279e
-
SHA1
d7a22176243764fa8e499405597d612eb36cfbbd
-
SHA256
a3bda5240c364f1afd8a70384330092c99eb8d1c0133cf0c2e4e0dfaf927d6d8
-
SHA512
608e69ea5e59b4a00359ec3dc5b65da689ff1908e6ee0ad5a8824fd774fcfb39abaedfe3c84142734a3d12019844196e0e5b4fe1f00e76c251662f4677b148ff
Static task
static1
Behavioral task
behavioral1
Sample
Requerimiento.exe
Resource
win7v20210410
Malware Config
Extracted
https://cdn.discordapp.com/attachments/869602547248283711/877244888020840448/Main.png
Targets
-
-
Target
Requerimiento.exe
-
Size
166KB
-
MD5
4c8b8d244f471478ad5c6bb4babb279e
-
SHA1
d7a22176243764fa8e499405597d612eb36cfbbd
-
SHA256
a3bda5240c364f1afd8a70384330092c99eb8d1c0133cf0c2e4e0dfaf927d6d8
-
SHA512
608e69ea5e59b4a00359ec3dc5b65da689ff1908e6ee0ad5a8824fd774fcfb39abaedfe3c84142734a3d12019844196e0e5b4fe1f00e76c251662f4677b148ff
-
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-