General
-
Target
c4b59e78c8f04caf59609f10f1f6ced44efc76384656a86de6d81dcab2d5acbd
-
Size
450KB
-
Sample
220305-zppqysahfk
-
MD5
064f9bb166e2d273804e8e9465afc030
-
SHA1
d0ded8463d2f4b9533e6b894dc03bc0095c172ae
-
SHA256
c4b59e78c8f04caf59609f10f1f6ced44efc76384656a86de6d81dcab2d5acbd
-
SHA512
f120fcac42e9205cf82cb6f48cc0566a2f0609a366c83351f74f38ba9de7e60a263e1771dffa4b4dc9f1c26ab648bb52f0dff5d12c68d26db9eb3a7c7c0a32de
Static task
static1
Behavioral task
behavioral1
Sample
c4b59e78c8f04caf59609f10f1f6ced44efc76384656a86de6d81dcab2d5acbd.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
c4b59e78c8f04caf59609f10f1f6ced44efc76384656a86de6d81dcab2d5acbd.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\readme-warning.txt
makop
Targets
-
-
Target
c4b59e78c8f04caf59609f10f1f6ced44efc76384656a86de6d81dcab2d5acbd
-
Size
450KB
-
MD5
064f9bb166e2d273804e8e9465afc030
-
SHA1
d0ded8463d2f4b9533e6b894dc03bc0095c172ae
-
SHA256
c4b59e78c8f04caf59609f10f1f6ced44efc76384656a86de6d81dcab2d5acbd
-
SHA512
f120fcac42e9205cf82cb6f48cc0566a2f0609a366c83351f74f38ba9de7e60a263e1771dffa4b4dc9f1c26ab648bb52f0dff5d12c68d26db9eb3a7c7c0a32de
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-