Analysis
-
max time kernel
4294179s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
15-03-2022 14:00
Static task
static1
Behavioral task
behavioral1
Sample
fadcd409182ccebbd149c8a57fa1ab3f8fddc7b66fba359223c21f644115edd4.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
fadcd409182ccebbd149c8a57fa1ab3f8fddc7b66fba359223c21f644115edd4.exe
Resource
win10v2004-20220310-en
General
-
Target
fadcd409182ccebbd149c8a57fa1ab3f8fddc7b66fba359223c21f644115edd4.exe
-
Size
552KB
-
MD5
778d3e92ac75f86b28c28b7742559e4c
-
SHA1
0dee739770437eb5b159359cda4bf6f569917672
-
SHA256
fadcd409182ccebbd149c8a57fa1ab3f8fddc7b66fba359223c21f644115edd4
-
SHA512
a2fe25b6155862c144317cc73f78ed71affab4675e8c4cfd44c1117e5ef9c4d0a814fe83ca8608409fff610f5522166a835cf17f3bb6663e91f7b19a3667bc46
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 bot.whatismyipaddress.com