General
-
Target
31fc239f5d0aa2a4496d5a3bf56c77cfad7d0b7fd68e3b4d2784b82c8105502f
-
Size
157KB
-
Sample
220328-wnmcnadab3
-
MD5
f4a85ad0057ce4c4a622471228cb2e6c
-
SHA1
24c344f1a33b3e6d2bd8fd301475c23bb8a6f30f
-
SHA256
31fc239f5d0aa2a4496d5a3bf56c77cfad7d0b7fd68e3b4d2784b82c8105502f
-
SHA512
03a4116994862357b8b162595c1ea3a5019a38411cedefcd2bed8f26bc60ca4204be1d3ea9bda306365a46cf1f43deeb90d848853238944b803fa77759911f0c
Static task
static1
Behavioral task
behavioral1
Sample
31fc239f5d0aa2a4496d5a3bf56c77cfad7d0b7fd68e3b4d2784b82c8105502f.exe
Resource
win7-20220311-en
Malware Config
Extracted
systembc
advertrex20.xyz:4044
gentexman37.xyz:4044
Targets
-
-
Target
31fc239f5d0aa2a4496d5a3bf56c77cfad7d0b7fd68e3b4d2784b82c8105502f
-
Size
157KB
-
MD5
f4a85ad0057ce4c4a622471228cb2e6c
-
SHA1
24c344f1a33b3e6d2bd8fd301475c23bb8a6f30f
-
SHA256
31fc239f5d0aa2a4496d5a3bf56c77cfad7d0b7fd68e3b4d2784b82c8105502f
-
SHA512
03a4116994862357b8b162595c1ea3a5019a38411cedefcd2bed8f26bc60ca4204be1d3ea9bda306365a46cf1f43deeb90d848853238944b803fa77759911f0c
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Uses Tor communications
Malware can proxy its traffic through Tor for more anonymity.
-