General
-
Target
10c3846867f70dd26c5a54332ed22070c9e5e0e4f52f05fdae12ead801f7933b.bin
-
Size
223KB
-
Sample
220309-jmk2zshggr
-
MD5
8879ae061540ce3de496adec3683b0fe
-
SHA1
4b5f73578a49ca01cc2ba7b414bcf1edfbefa079
-
SHA256
10c3846867f70dd26c5a54332ed22070c9e5e0e4f52f05fdae12ead801f7933b
-
SHA512
bf01d7738c47c1f24dab0e70643568f99b73049804a53ac23b492c80e2558aa4166a84d4c247bf3149523096a7379ca4835a24abc6de18cf38d45562e0b98da3
Behavioral task
behavioral1
Sample
10c3846867f70dd26c5a54332ed22070c9e5e0e4f52f05fdae12ead801f7933b.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
10c3846867f70dd26c5a54332ed22070c9e5e0e4f52f05fdae12ead801f7933b.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
jester
ads555man
http://jesterdcuxzbey4xvlwwheoecpltru5be2mzuk4w7a7nrhckdjjhrbyd.onion/report/ads555man
https://api.anonfiles.com/upload?token=d26d620842507144
efbb42d7-d0db-4f16-a194-3d9d9d1fc654
-
license_key
65EEBAF23D4744267D131CD5BA37E706
Targets
-
-
Target
10c3846867f70dd26c5a54332ed22070c9e5e0e4f52f05fdae12ead801f7933b.bin
-
Size
223KB
-
MD5
8879ae061540ce3de496adec3683b0fe
-
SHA1
4b5f73578a49ca01cc2ba7b414bcf1edfbefa079
-
SHA256
10c3846867f70dd26c5a54332ed22070c9e5e0e4f52f05fdae12ead801f7933b
-
SHA512
bf01d7738c47c1f24dab0e70643568f99b73049804a53ac23b492c80e2558aa4166a84d4c247bf3149523096a7379ca4835a24abc6de18cf38d45562e0b98da3
Score10/10-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-