General
-
Target
d64a8cba1785faf9616ffe7a982ab013432b23aef75bd097d4f75dbe79ad2415
-
Size
173KB
-
Sample
220320-gcefcahfe6
-
MD5
cbdfe40fef7a9604064f8494f73e49bc
-
SHA1
09bf2fcb2f8c54e752eb5a10f2b6fc66d584b43e
-
SHA256
d64a8cba1785faf9616ffe7a982ab013432b23aef75bd097d4f75dbe79ad2415
-
SHA512
bee9514bd26fa31ba4977c4088d584884861dba4a9e69264e95a1fc5804edde3310ddc07f762d9908cfbf8c6436a32bd4b7539ac254913b2fa97c528bf1238dd
Static task
static1
Behavioral task
behavioral1
Sample
d64a8cba1785faf9616ffe7a982ab013432b23aef75bd097d4f75dbe79ad2415.exe
Resource
win7-20220311-en
Malware Config
Extracted
systembc
dec15coma.com:4039
dec15coma.xyz:4039
Targets
-
-
Target
d64a8cba1785faf9616ffe7a982ab013432b23aef75bd097d4f75dbe79ad2415
-
Size
173KB
-
MD5
cbdfe40fef7a9604064f8494f73e49bc
-
SHA1
09bf2fcb2f8c54e752eb5a10f2b6fc66d584b43e
-
SHA256
d64a8cba1785faf9616ffe7a982ab013432b23aef75bd097d4f75dbe79ad2415
-
SHA512
bee9514bd26fa31ba4977c4088d584884861dba4a9e69264e95a1fc5804edde3310ddc07f762d9908cfbf8c6436a32bd4b7539ac254913b2fa97c528bf1238dd
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Uses Tor communications
Malware can proxy its traffic through Tor for more anonymity.
-