Analysis
-
max time kernel
4294191s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
14-03-2022 18:02
Static task
static1
Behavioral task
behavioral1
Sample
b67f8adf12ac9fc182d38bab985b4b020ec35f614cb4956f587738ff111b8dc5.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
b67f8adf12ac9fc182d38bab985b4b020ec35f614cb4956f587738ff111b8dc5.exe
Resource
win10v2004-20220310-en
General
-
Target
b67f8adf12ac9fc182d38bab985b4b020ec35f614cb4956f587738ff111b8dc5.exe
-
Size
553KB
-
MD5
d504f0c38156c93ec2cdde1b42677499
-
SHA1
1359c6b4b4e688935d56b12fd7aa3c541e57e177
-
SHA256
b67f8adf12ac9fc182d38bab985b4b020ec35f614cb4956f587738ff111b8dc5
-
SHA512
7272b6096ea19c5137042c64951f3571cc9c32de7008ed0474dd241e751c459d55b89aafdc15142a6899b2e14714a14acdad3144be6aa698580ee64dbbd21750
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 bot.whatismyipaddress.com