General
-
Target
dab3afd4e25abdc582e6325f31257ee8
-
Size
487KB
-
Sample
211204-d5xwlsabdq
-
MD5
dab3afd4e25abdc582e6325f31257ee8
-
SHA1
88648132d7f0b1fe59da88c696016e3b1e496fa5
-
SHA256
e038cd85c9da66e9517bba1e3af819a7cb1cf068fe955b8e125273d1e0533c2b
-
SHA512
e75b6166812fa7fb5852438a8ee8b2ad0ac48ced215c1bf8990f662efb63777164a731d899ffa743baf45671f90ef2af18c87ea43c5da57b4092536948b8bfc2
Static task
static1
Behavioral task
behavioral1
Sample
dab3afd4e25abdc582e6325f31257ee8.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
dab3afd4e25abdc582e6325f31257ee8.exe
Resource
win10-en-20211104
Malware Config
Extracted
jester
fanyze
http://jesterdcuxzbey4xvlwwheoecpltru5be2mzuk4w7a7nrhckdjjhrbyd.onion/report/fanyze
https://api.anonfiles.com/upload?token=d26d620842507144
f9999b04-5f6b-47c3-830e-f07171c30d02
-
license_key
9A554B1F2269B7AF81AF6B074943117B
Targets
-
-
Target
dab3afd4e25abdc582e6325f31257ee8
-
Size
487KB
-
MD5
dab3afd4e25abdc582e6325f31257ee8
-
SHA1
88648132d7f0b1fe59da88c696016e3b1e496fa5
-
SHA256
e038cd85c9da66e9517bba1e3af819a7cb1cf068fe955b8e125273d1e0533c2b
-
SHA512
e75b6166812fa7fb5852438a8ee8b2ad0ac48ced215c1bf8990f662efb63777164a731d899ffa743baf45671f90ef2af18c87ea43c5da57b4092536948b8bfc2
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-