General
-
Target
f4bcf65872fdee88023c7b005e860dee157c549ee1db7e67a160091b713788f2
-
Size
234KB
-
Sample
220319-s6aj2adae3
-
MD5
32990c51bb03c767c66472ea067e6d0c
-
SHA1
cc1f2bc671013ca140189b2314f71bdf35af2167
-
SHA256
f4bcf65872fdee88023c7b005e860dee157c549ee1db7e67a160091b713788f2
-
SHA512
2f7552269dcd22ab9401d77e4d6679e71814e138662b80838b913844345e390d79864929d9037f8d206643d7c82698dd6d964e96312b291c7a368e3007c67d12
Static task
static1
Behavioral task
behavioral1
Sample
f4bcf65872fdee88023c7b005e860dee157c549ee1db7e67a160091b713788f2.exe
Resource
win7-20220311-en
Malware Config
Extracted
systembc
dec15coma.com:4039
dec15coma.xyz:4039
Targets
-
-
Target
f4bcf65872fdee88023c7b005e860dee157c549ee1db7e67a160091b713788f2
-
Size
234KB
-
MD5
32990c51bb03c767c66472ea067e6d0c
-
SHA1
cc1f2bc671013ca140189b2314f71bdf35af2167
-
SHA256
f4bcf65872fdee88023c7b005e860dee157c549ee1db7e67a160091b713788f2
-
SHA512
2f7552269dcd22ab9401d77e4d6679e71814e138662b80838b913844345e390d79864929d9037f8d206643d7c82698dd6d964e96312b291c7a368e3007c67d12
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Uses Tor communications
Malware can proxy its traffic through Tor for more anonymity.
-