General
-
Target
6cbce4db4d81c67bdf8a077e493fe2ac29c07774baa33def3389c139ddef5e42
-
Size
276KB
-
Sample
220325-a3d4yaheb4
-
MD5
822285256eafa07724fd29f8e85c759e
-
SHA1
5da5dc2c1be087ce6046f6903a6c773b28a3b6cf
-
SHA256
6cbce4db4d81c67bdf8a077e493fe2ac29c07774baa33def3389c139ddef5e42
-
SHA512
4d93d7250dc210fff4d54802253d98f5f868f4a273b0a83207a77617657c2ccc7748c9b6743096c7a9bffa9a24221f014d83986f2b6e7751754bf090b4a6a9a0
Static task
static1
Behavioral task
behavioral1
Sample
6cbce4db4d81c67bdf8a077e493fe2ac29c07774baa33def3389c139ddef5e42.exe
Resource
win7-20220310-en
Malware Config
Extracted
systembc
advertrex20.xyz:4044
gentexman37.xyz:4044
Targets
-
-
Target
6cbce4db4d81c67bdf8a077e493fe2ac29c07774baa33def3389c139ddef5e42
-
Size
276KB
-
MD5
822285256eafa07724fd29f8e85c759e
-
SHA1
5da5dc2c1be087ce6046f6903a6c773b28a3b6cf
-
SHA256
6cbce4db4d81c67bdf8a077e493fe2ac29c07774baa33def3389c139ddef5e42
-
SHA512
4d93d7250dc210fff4d54802253d98f5f868f4a273b0a83207a77617657c2ccc7748c9b6743096c7a9bffa9a24221f014d83986f2b6e7751754bf090b4a6a9a0
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Uses Tor communications
Malware can proxy its traffic through Tor for more anonymity.
-