Analysis
-
max time kernel
4294181s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
10-03-2022 17:13
Static task
static1
Behavioral task
behavioral1
Sample
5617d51aa020250f69aab4cb3fd4a52efc1dda4367302e3f3f069b117cb948e0.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
5617d51aa020250f69aab4cb3fd4a52efc1dda4367302e3f3f069b117cb948e0.exe
Resource
win10v2004-en-20220113
General
-
Target
5617d51aa020250f69aab4cb3fd4a52efc1dda4367302e3f3f069b117cb948e0.exe
-
Size
552KB
-
MD5
8e677a902c0aa53ab104797c22502902
-
SHA1
72ed219b7d1a45a979ad309cf60ee3d66529e96a
-
SHA256
5617d51aa020250f69aab4cb3fd4a52efc1dda4367302e3f3f069b117cb948e0
-
SHA512
62ebd6afcd08d92564fb3d1a8a072fb99a68b90b511927e997379a81a5cdb43e2cafad2f7a1052c7b70c14bb52d4a23701361da2da0980e1a85d080ddf5ff5da
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 bot.whatismyipaddress.com