General
-
Target
3a9397af4dfc720df6b8d7c2949bcac307fd5c2540ca114904f43c162e0f4a4b
-
Size
670KB
-
Sample
220328-sz3bgafgap
-
MD5
cebad7507c9b80980e1f6d9f829a7e41
-
SHA1
21a3b8876d3ed54da07825f9696bfb5597c47439
-
SHA256
3a9397af4dfc720df6b8d7c2949bcac307fd5c2540ca114904f43c162e0f4a4b
-
SHA512
5406f08f884584b88df81e3968b9dc37eb3cf4bccfb3d84dffedb7a421a8166f616d9c0b9d036067a06ac5ae59f3141974ee9759a8df18ebb29e2a618bea5bab
Static task
static1
Behavioral task
behavioral1
Sample
3a9397af4dfc720df6b8d7c2949bcac307fd5c2540ca114904f43c162e0f4a4b.exe
Resource
win7-20220310-en
Malware Config
Targets
-
-
Target
3a9397af4dfc720df6b8d7c2949bcac307fd5c2540ca114904f43c162e0f4a4b
-
Size
670KB
-
MD5
cebad7507c9b80980e1f6d9f829a7e41
-
SHA1
21a3b8876d3ed54da07825f9696bfb5597c47439
-
SHA256
3a9397af4dfc720df6b8d7c2949bcac307fd5c2540ca114904f43c162e0f4a4b
-
SHA512
5406f08f884584b88df81e3968b9dc37eb3cf4bccfb3d84dffedb7a421a8166f616d9c0b9d036067a06ac5ae59f3141974ee9759a8df18ebb29e2a618bea5bab
-
suricata: ET MALWARE VNCStartServer BOT Variant CnC Beacon
suricata: ET MALWARE VNCStartServer BOT Variant CnC Beacon
-
suricata: ET MALWARE VNCStartServer USR Variant CnC Beacon
suricata: ET MALWARE VNCStartServer USR Variant CnC Beacon
-
DarkVNC Payload
-
Suspicious use of SetThreadContext
-