General
-
Target
dcd20edf47f46b27c1b81cf03d18dc00aecff1d1eba9f0a0e55e1182f4a2f0b6
-
Size
120KB
-
Sample
211204-jf1tvsddg9
-
MD5
73073649b02ccf2809aee7713ee72ee2
-
SHA1
b724c23ed90ddf15412aa917d87422274521e48a
-
SHA256
dcd20edf47f46b27c1b81cf03d18dc00aecff1d1eba9f0a0e55e1182f4a2f0b6
-
SHA512
2c3688c829ee654a5eb65d3633478a01072ccedb69724bcb71d059823ab0a486a30867207c3d05ad56fc7005e46fa78690c152f019a5e0cd4ea92a11357a59e4
Static task
static1
Behavioral task
behavioral1
Sample
dcd20edf47f46b27c1b81cf03d18dc00aecff1d1eba9f0a0e55e1182f4a2f0b6.exe
Resource
win10-en-20211104
Malware Config
Targets
-
-
Target
dcd20edf47f46b27c1b81cf03d18dc00aecff1d1eba9f0a0e55e1182f4a2f0b6
-
Size
120KB
-
MD5
73073649b02ccf2809aee7713ee72ee2
-
SHA1
b724c23ed90ddf15412aa917d87422274521e48a
-
SHA256
dcd20edf47f46b27c1b81cf03d18dc00aecff1d1eba9f0a0e55e1182f4a2f0b6
-
SHA512
2c3688c829ee654a5eb65d3633478a01072ccedb69724bcb71d059823ab0a486a30867207c3d05ad56fc7005e46fa78690c152f019a5e0cd4ea92a11357a59e4
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Adds Run key to start application
-