General
-
Target
c37e79057ccdd18492554cfb1d86d77a69667ce2a8b0841d560f12eb479f356a
-
Size
173KB
-
Sample
220319-hp816adea6
-
MD5
b116459b4baffd9c1efd7153884f9d35
-
SHA1
673fd7eb331a1c5645fa4264f85bbd722531f318
-
SHA256
c37e79057ccdd18492554cfb1d86d77a69667ce2a8b0841d560f12eb479f356a
-
SHA512
6f09a7b7be8a3f4519492d387e2c1441e70cc411eafb2e463ce0f0b802e9b672a60895b778a27adaa5a55d9fd35c3285a342658ca77cd1240c026efb10eea1aa
Static task
static1
Behavioral task
behavioral1
Sample
c37e79057ccdd18492554cfb1d86d77a69667ce2a8b0841d560f12eb479f356a.exe
Resource
win7-20220311-en
Malware Config
Extracted
systembc
dec15coma.com:4039
dec15coma.xyz:4039
Targets
-
-
Target
c37e79057ccdd18492554cfb1d86d77a69667ce2a8b0841d560f12eb479f356a
-
Size
173KB
-
MD5
b116459b4baffd9c1efd7153884f9d35
-
SHA1
673fd7eb331a1c5645fa4264f85bbd722531f318
-
SHA256
c37e79057ccdd18492554cfb1d86d77a69667ce2a8b0841d560f12eb479f356a
-
SHA512
6f09a7b7be8a3f4519492d387e2c1441e70cc411eafb2e463ce0f0b802e9b672a60895b778a27adaa5a55d9fd35c3285a342658ca77cd1240c026efb10eea1aa
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Uses Tor communications
Malware can proxy its traffic through Tor for more anonymity.
-