Analysis
-
max time kernel
4294178s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
11-03-2022 01:18
Static task
static1
Behavioral task
behavioral1
Sample
3a8f15131ff7af9e6d09484b0a5ab5cdcede337c7c446cdb6c14eba7cf10129c.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
3a8f15131ff7af9e6d09484b0a5ab5cdcede337c7c446cdb6c14eba7cf10129c.exe
Resource
win10v2004-20220310-en
General
-
Target
3a8f15131ff7af9e6d09484b0a5ab5cdcede337c7c446cdb6c14eba7cf10129c.exe
-
Size
552KB
-
MD5
06153d592e4b95aa9aec75c012cbbb2c
-
SHA1
cb088bc89010e6c9b80bdc2e92307527ac2accca
-
SHA256
3a8f15131ff7af9e6d09484b0a5ab5cdcede337c7c446cdb6c14eba7cf10129c
-
SHA512
e719a626255ffaa1bca35be7400b51235dd7309b076aba8667cbd43ec39b6ecda83f3390793e9758b833a1ddb86f57858a8e20d7cd92124ae3c202492d265c91
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 bot.whatismyipaddress.com