General
-
Target
befd8b5b90ef38e3d04711b0aae55805149ad1f3c77eb39bc9002760ce1684b6
-
Size
135KB
-
Sample
220131-zq3zzabghp
-
MD5
74668e84ee38695216ef737f389dc55c
-
SHA1
e4d6928f6592a2a38d880cff7e0f30db2a15896e
-
SHA256
befd8b5b90ef38e3d04711b0aae55805149ad1f3c77eb39bc9002760ce1684b6
-
SHA512
90a550498a77284e5a936d92513994976ed5b67ffd8f5ca1476570f1c7307f69ed8400e86ab2588d24c77df66279daca98e4735b1b650cf46770093a7d1b8c24
Static task
static1
Behavioral task
behavioral1
Sample
befd8b5b90ef38e3d04711b0aae55805149ad1f3c77eb39bc9002760ce1684b6.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
befd8b5b90ef38e3d04711b0aae55805149ad1f3c77eb39bc9002760ce1684b6.dll
Resource
win10v2004-en-20220113
Malware Config
Extracted
plugx
rainydaysweb.com:80
rainydaysweb.com:443
rainydaysweb.com:53
dhHRYvLNaOVJXZdDsbdc
-
folder
AAM UpdatesblF
Targets
-
-
Target
befd8b5b90ef38e3d04711b0aae55805149ad1f3c77eb39bc9002760ce1684b6
-
Size
135KB
-
MD5
74668e84ee38695216ef737f389dc55c
-
SHA1
e4d6928f6592a2a38d880cff7e0f30db2a15896e
-
SHA256
befd8b5b90ef38e3d04711b0aae55805149ad1f3c77eb39bc9002760ce1684b6
-
SHA512
90a550498a77284e5a936d92513994976ed5b67ffd8f5ca1476570f1c7307f69ed8400e86ab2588d24c77df66279daca98e4735b1b650cf46770093a7d1b8c24
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Sets service image path in registry
-