General
-
Target
iE8JUAJp7.bin.zip
-
Size
140KB
-
Sample
211028-s6m55agfbk
-
MD5
06595c8a8b5293727765fbc931d6bfe1
-
SHA1
ed700f9ebea686f9dd2c5a4f9d6c3e051d1c4452
-
SHA256
fedb39ac98c39b688703f1968405d75432d881ff34405d3087a989440735aa8e
-
SHA512
6b4a4bcce470bd755ac1ef20a3a967e2068e58fe9d095a1dd58e6de6a0142488a369ee98904710f02bb6150dc29c93e566feca8d4c25624d512250b50778f607
Static task
static1
Behavioral task
behavioral1
Sample
iE8JUAJp7.bin.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
iE8JUAJp7.bin.exe
Resource
win10-en-20211014
Malware Config
Targets
-
-
Target
iE8JUAJp7.bin
-
Size
385KB
-
MD5
a9a0fae4766d9f7cafa1560f5f62e46f
-
SHA1
d582608dc07bd9f771334cdb60626755997dd56c
-
SHA256
f70966e32d18a1e2ed51ebdcc6b985d8f7613febf0680639076c71ebeab6a350
-
SHA512
5c2f89a16c5291d509f41bd5f12d18a386892738cfd5fb5cbd2156c52d46f28abde5f199461fe9a8bf3aa3f7e4644fe66c3ad48c3b114b792efdbf421468856b
Score8/10-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Downloads PsExec from SysInternals website
Sysinternals tools like PsExec are often leveraged maliciously by malware families due to being commonly used by testers/administrators.
-
Modifies Windows Firewall
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Modifies WinLogon
-