Analysis
-
max time kernel
4294179s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
12-03-2022 01:05
Static task
static1
Behavioral task
behavioral1
Sample
a8fe741b5aa3e03caec6b998732ae929a2f01b62d5bfd22eebf7387e210d684e.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
a8fe741b5aa3e03caec6b998732ae929a2f01b62d5bfd22eebf7387e210d684e.exe
Resource
win10v2004-en-20220113
General
-
Target
a8fe741b5aa3e03caec6b998732ae929a2f01b62d5bfd22eebf7387e210d684e.exe
-
Size
552KB
-
MD5
a3fe7fab7d45ef4c7e070235a35c6cdb
-
SHA1
aebf8073288a115312fb596a014d3b3efb9a4a86
-
SHA256
a8fe741b5aa3e03caec6b998732ae929a2f01b62d5bfd22eebf7387e210d684e
-
SHA512
ab57b2ee151a80a0e209e876de379f3d9f7dbc3a086ff6d59eace219fc72d4a397471caff7bb9f86abe4af7b7bdfca8ec1b85d5491399d31d4c790ffc9beea1a
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 bot.whatismyipaddress.com