Analysis
-
max time kernel
122s -
max time network
135s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
22-02-2022 20:11
Static task
static1
Behavioral task
behavioral1
Sample
0cf8d6df160884ce6c60de266d3094bbc352e9a3aaba030c06529defd07ba7f4.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0cf8d6df160884ce6c60de266d3094bbc352e9a3aaba030c06529defd07ba7f4.exe
Resource
win10v2004-en-20220112
General
-
Target
0cf8d6df160884ce6c60de266d3094bbc352e9a3aaba030c06529defd07ba7f4.exe
-
Size
552KB
-
MD5
f011287c0d4e51e522a4a8f997571ea2
-
SHA1
efd9e9905f140f06f13c597f380f466a8d49f5b9
-
SHA256
0cf8d6df160884ce6c60de266d3094bbc352e9a3aaba030c06529defd07ba7f4
-
SHA512
30f3b1bd6c9e16483477f32f3af34ad2b3456b54287c572518f9e8d81192f5851e4c469d13560d7b2f3b1abac5c85c4c362cb22558a22b7956dff349c1d7fd4c
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 bot.whatismyipaddress.com