General
-
Target
92df711671ec00fc5a88a20f1d2aa5079640bafbedd8a4c17d14b7063f8488c5
-
Size
294KB
-
Sample
220327-3qv6xaede7
-
MD5
5b93ba193d86132768b1ed5c65ef4398
-
SHA1
5427fe4fc3bee0335881bd3f699147f105e90fe5
-
SHA256
92df711671ec00fc5a88a20f1d2aa5079640bafbedd8a4c17d14b7063f8488c5
-
SHA512
74a2368016125f256e3bc8c5c4e6061c73b992382d6f0a1263463035327f855ebf8b0dcca05cd971f0c8131f5fa92c5256c6a1a058fd79e173446240dfcfcd97
Static task
static1
Behavioral task
behavioral1
Sample
92df711671ec00fc5a88a20f1d2aa5079640bafbedd8a4c17d14b7063f8488c5.exe
Resource
win7-20220331-en
Malware Config
Extracted
systembc
advertrex20.xyz:4044
gentexman37.xyz:4044
Targets
-
-
Target
92df711671ec00fc5a88a20f1d2aa5079640bafbedd8a4c17d14b7063f8488c5
-
Size
294KB
-
MD5
5b93ba193d86132768b1ed5c65ef4398
-
SHA1
5427fe4fc3bee0335881bd3f699147f105e90fe5
-
SHA256
92df711671ec00fc5a88a20f1d2aa5079640bafbedd8a4c17d14b7063f8488c5
-
SHA512
74a2368016125f256e3bc8c5c4e6061c73b992382d6f0a1263463035327f855ebf8b0dcca05cd971f0c8131f5fa92c5256c6a1a058fd79e173446240dfcfcd97
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Uses Tor communications
Malware can proxy its traffic through Tor for more anonymity.
-