General
-
Target
10fd1c7aabf703640bf16c35aed6a1507efbf6da46ab534d12b911fe307e0b28
-
Size
172KB
-
Sample
220320-dycl4agaa3
-
MD5
6047ef3dc3006268a9406af1a7be63e3
-
SHA1
57602f69a5e7d855643b61e80ff32c1947cc6d64
-
SHA256
10fd1c7aabf703640bf16c35aed6a1507efbf6da46ab534d12b911fe307e0b28
-
SHA512
1e2ca97ab3e0edbbc44c89e6f854fcfb78a9b8927f8b970ac2971aa58a4011ab1cf1a66bc8efbfa60d30dbdd45df538e21e89ef876b410c1d66950ce8a4a4613
Static task
static1
Behavioral task
behavioral1
Sample
10fd1c7aabf703640bf16c35aed6a1507efbf6da46ab534d12b911fe307e0b28.exe
Resource
win7-20220311-en
Malware Config
Extracted
systembc
dec15coma.com:4039
dec15coma.xyz:4039
Targets
-
-
Target
10fd1c7aabf703640bf16c35aed6a1507efbf6da46ab534d12b911fe307e0b28
-
Size
172KB
-
MD5
6047ef3dc3006268a9406af1a7be63e3
-
SHA1
57602f69a5e7d855643b61e80ff32c1947cc6d64
-
SHA256
10fd1c7aabf703640bf16c35aed6a1507efbf6da46ab534d12b911fe307e0b28
-
SHA512
1e2ca97ab3e0edbbc44c89e6f854fcfb78a9b8927f8b970ac2971aa58a4011ab1cf1a66bc8efbfa60d30dbdd45df538e21e89ef876b410c1d66950ce8a4a4613
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Uses Tor communications
Malware can proxy its traffic through Tor for more anonymity.
-