Analysis
-
max time kernel
4294179s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
14-03-2022 05:28
Static task
static1
Behavioral task
behavioral1
Sample
ce6f9c4c6755482d598b0a4b62b975652713fa1c9739ecc22c0bfed87263c258.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
ce6f9c4c6755482d598b0a4b62b975652713fa1c9739ecc22c0bfed87263c258.exe
Resource
win10v2004-en-20220113
General
-
Target
ce6f9c4c6755482d598b0a4b62b975652713fa1c9739ecc22c0bfed87263c258.exe
-
Size
552KB
-
MD5
5958757dbe968a0c7bb2551830f894b8
-
SHA1
20c7fe9673dfe5bd6d5dbc4662a28caf1fdd3190
-
SHA256
ce6f9c4c6755482d598b0a4b62b975652713fa1c9739ecc22c0bfed87263c258
-
SHA512
5668f6b3ca36baecb6897edc3a3f00c5a84680bf3e74ac8e6cd36d49ea0fffc10e2a2b4cd2f00a9d3121041441987467196a25a8dcde194a2123253f0fc52cf2
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 bot.whatismyipaddress.com