Analysis
-
max time kernel
4294181s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
12-03-2022 08:35
Static task
static1
Behavioral task
behavioral1
Sample
8fc37e469e2cd0e35127f8a8661af6b81d7287c817d67a94271582aab344a488.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
8fc37e469e2cd0e35127f8a8661af6b81d7287c817d67a94271582aab344a488.exe
Resource
win10v2004-en-20220113
General
-
Target
8fc37e469e2cd0e35127f8a8661af6b81d7287c817d67a94271582aab344a488.exe
-
Size
552KB
-
MD5
adfda30816b925972a0af0f8b5b427c5
-
SHA1
469f746b467fc3e6259a4b02314d6a44320a3e49
-
SHA256
8fc37e469e2cd0e35127f8a8661af6b81d7287c817d67a94271582aab344a488
-
SHA512
0b5ca8b08c9ee176acd8e65b999eb218f7b0c86c8a42821e5d14e20b572b6e071edf2fe4007815720a46c3bf4807532b3a59769dc6af959707c75b9239824e6f
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 bot.whatismyipaddress.com