General
-
Target
if.dll
-
Size
1.5MB
-
Sample
220131-tcm4pshgak
-
MD5
deef80792ae5c52d3553453d124c0457
-
SHA1
b809c0a54e70d8d2377fc37a17d952ec98698670
-
SHA256
ebe7a2c72e2e89732d435a7d491c9cd85f125b1584bb807f921b03dff9d16b94
-
SHA512
61ecdee50c84792b88f8f1f65679d6141ee4b314d13bfb037c4a6af373d85ab8af6b389c813e5f158529f54321841d9540fdece77da283e876ff43202325bdfa
Static task
static1
Behavioral task
behavioral1
Sample
if.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
if.dll
Resource
win10v2004-en-20220113
Malware Config
Extracted
hancitor
3101_sjiuwe
http://cinenmera.com/9/forum.php
http://biquagin.ru/9/forum.php
http://joirwsin.ru/9/forum.php
Targets
-
-
Target
if.dll
-
Size
1.5MB
-
MD5
deef80792ae5c52d3553453d124c0457
-
SHA1
b809c0a54e70d8d2377fc37a17d952ec98698670
-
SHA256
ebe7a2c72e2e89732d435a7d491c9cd85f125b1584bb807f921b03dff9d16b94
-
SHA512
61ecdee50c84792b88f8f1f65679d6141ee4b314d13bfb037c4a6af373d85ab8af6b389c813e5f158529f54321841d9540fdece77da283e876ff43202325bdfa
Score10/10-
Blocklisted process makes network request
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-