Analysis
-
max time kernel
4294183s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
10-03-2022 19:55
Static task
static1
Behavioral task
behavioral1
Sample
4cc802b63d37244b9a429b41b9877f9ca5bec8228cd89de54ee9a174baeb3804.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
4cc802b63d37244b9a429b41b9877f9ca5bec8228cd89de54ee9a174baeb3804.exe
Resource
win10v2004-en-20220112
General
-
Target
4cc802b63d37244b9a429b41b9877f9ca5bec8228cd89de54ee9a174baeb3804.exe
-
Size
553KB
-
MD5
02156b7788e18b515c56c62d04d77efd
-
SHA1
24a4499830ad78de0d71f4e9a5e95e9e0e1119e4
-
SHA256
4cc802b63d37244b9a429b41b9877f9ca5bec8228cd89de54ee9a174baeb3804
-
SHA512
f516d06fc519bee942f480128b403d991d8ece15cb8b48a8688e1c98a15a44f12beadd0633c464ffc2083ceda73d206dc21874077c02abb9fec298428918bdf6
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 bot.whatismyipaddress.com