Analysis
-
max time kernel
120s -
max time network
138s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
10-03-2022 18:03
Static task
static1
Behavioral task
behavioral1
Sample
532cfd84f34e65c565540461f0dbf74ecc35a6db94dfc3d2a118548608e28638.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
532cfd84f34e65c565540461f0dbf74ecc35a6db94dfc3d2a118548608e28638.exe
Resource
win10v2004-en-20220113
General
-
Target
532cfd84f34e65c565540461f0dbf74ecc35a6db94dfc3d2a118548608e28638.exe
-
Size
552KB
-
MD5
76265e3e359857039c2c2481b859f2e1
-
SHA1
8d50812d718098db9e536205b515ac2bc7abf36c
-
SHA256
532cfd84f34e65c565540461f0dbf74ecc35a6db94dfc3d2a118548608e28638
-
SHA512
53b59064a8e41eb5e1feed3496f764c32c1919e7b3075d29ec48f5b6749083ba22c48e5bc908ca13ee82223c6a1a78927d3f52a981082aae0bc03f3931239724
Malware Config
Signatures
-
Sets file execution options in registry 2 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 bot.whatismyipaddress.com