General
-
Target
4bf2d837a68c2705c50b24c83381fdd039bb3e79ce31fbf06d9e5d603192984e
-
Size
284KB
-
Sample
220326-dnbl2sfeh7
-
MD5
7f1fec40c35280a72c4863430821e0b5
-
SHA1
6bc22f20dd9a338224db71dc8856587c48376190
-
SHA256
4bf2d837a68c2705c50b24c83381fdd039bb3e79ce31fbf06d9e5d603192984e
-
SHA512
681b745e3fd3aab3ea7c7f65e8bec064a4f067f8dfddae0db7a6a1e58e8fba744cd0846e1b3882d69f16df236e0b064c7cf512ca8c3079f8403ef8374c8b9ca7
Static task
static1
Behavioral task
behavioral1
Sample
4bf2d837a68c2705c50b24c83381fdd039bb3e79ce31fbf06d9e5d603192984e.exe
Resource
win7-20220310-en
Malware Config
Extracted
systembc
advertrex20.xyz:4044
gentexman37.xyz:4044
Targets
-
-
Target
4bf2d837a68c2705c50b24c83381fdd039bb3e79ce31fbf06d9e5d603192984e
-
Size
284KB
-
MD5
7f1fec40c35280a72c4863430821e0b5
-
SHA1
6bc22f20dd9a338224db71dc8856587c48376190
-
SHA256
4bf2d837a68c2705c50b24c83381fdd039bb3e79ce31fbf06d9e5d603192984e
-
SHA512
681b745e3fd3aab3ea7c7f65e8bec064a4f067f8dfddae0db7a6a1e58e8fba744cd0846e1b3882d69f16df236e0b064c7cf512ca8c3079f8403ef8374c8b9ca7
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Uses Tor communications
Malware can proxy its traffic through Tor for more anonymity.
-