General
-
Target
IMRML1~1.exe
-
Size
42KB
-
Sample
220103-nhlvyabcc9
-
MD5
fe21e1480d540be38df0935c0547bd96
-
SHA1
309ae9f6f193a64d107ef5667355c17587d46832
-
SHA256
0c49eaabb6a4a0d82a45e26b05251b2a09dd41be1e746e2e77ebc82f0b5f09a2
-
SHA512
72922e72412d499f89e80db9e38c8f263d0b301b18c886b317aff2aca3099ddb307facb5ba235a362dae4bcef8d448fb78a2903d7a144dfd71e9fd4a0261f22c
Static task
static1
Behavioral task
behavioral1
Sample
IMRML1~1.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
IMRML1~1.exe
Resource
win10-en-20211208
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\+README-WARNING+.txt
Targets
-
-
Target
IMRML1~1.exe
-
Size
42KB
-
MD5
fe21e1480d540be38df0935c0547bd96
-
SHA1
309ae9f6f193a64d107ef5667355c17587d46832
-
SHA256
0c49eaabb6a4a0d82a45e26b05251b2a09dd41be1e746e2e77ebc82f0b5f09a2
-
SHA512
72922e72412d499f89e80db9e38c8f263d0b301b18c886b317aff2aca3099ddb307facb5ba235a362dae4bcef8d448fb78a2903d7a144dfd71e9fd4a0261f22c
Score10/10-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-