General
-
Target
ef0bdb788f53fc4a76b0b854bc7bf56ec21ffb2a8dce82e2990344d9a055914c
-
Size
35KB
-
Sample
220306-dz3jxahhe5
-
MD5
568b492fa5ec08ae467fe211727c6aaf
-
SHA1
98f6e0f429abd900771d34d4b96f9bd586b145e4
-
SHA256
ef0bdb788f53fc4a76b0b854bc7bf56ec21ffb2a8dce82e2990344d9a055914c
-
SHA512
c6dacca39169863e2b56854f8feeb11e7bdfff1d99f116351b5f83d0ebfce528247b4f7c51a4efa5484b4661e1ef576e1669a0ecb6b1c550fdf269655e63bf76
Static task
static1
Behavioral task
behavioral1
Sample
ef0bdb788f53fc4a76b0b854bc7bf56ec21ffb2a8dce82e2990344d9a055914c.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
ef0bdb788f53fc4a76b0b854bc7bf56ec21ffb2a8dce82e2990344d9a055914c.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\readme-warning.txt
makop
Targets
-
-
Target
ef0bdb788f53fc4a76b0b854bc7bf56ec21ffb2a8dce82e2990344d9a055914c
-
Size
35KB
-
MD5
568b492fa5ec08ae467fe211727c6aaf
-
SHA1
98f6e0f429abd900771d34d4b96f9bd586b145e4
-
SHA256
ef0bdb788f53fc4a76b0b854bc7bf56ec21ffb2a8dce82e2990344d9a055914c
-
SHA512
c6dacca39169863e2b56854f8feeb11e7bdfff1d99f116351b5f83d0ebfce528247b4f7c51a4efa5484b4661e1ef576e1669a0ecb6b1c550fdf269655e63bf76
Score10/10-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-