Analysis
-
max time kernel
4294183s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
10-03-2022 02:33
Static task
static1
Behavioral task
behavioral1
Sample
6d1a0ed948c798de95e7bdd984392fa873bee68cb9041c8145bb56fe28a682d9.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
6d1a0ed948c798de95e7bdd984392fa873bee68cb9041c8145bb56fe28a682d9.exe
Resource
win10v2004-en-20220113
General
-
Target
6d1a0ed948c798de95e7bdd984392fa873bee68cb9041c8145bb56fe28a682d9.exe
-
Size
552KB
-
MD5
c698d914efc095070f1a1cde5344790e
-
SHA1
f0eab2c4599f50ee5e4cf9f0cf8ddc8cc609ef46
-
SHA256
6d1a0ed948c798de95e7bdd984392fa873bee68cb9041c8145bb56fe28a682d9
-
SHA512
e6b414d1bc0e2ae755b6132b3f7fe3caffc41016bce44f7391d150ecb107e317c1237566fa610f4a440cc34bac6d26e26bd0957181bb2fdbb40808cb86c3e59a
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 bot.whatismyipaddress.com