General
-
Target
8e853d68c303ff55e85082e83b45978a13fc2821a8363a1c1ad50cc2ddb6eb41
-
Size
318KB
-
Sample
220415-cr4assccc8
-
MD5
69ab4ae7051a7962e610f4a8cc56d634
-
SHA1
9275cfb1e28dc75e614ab1fc6b7d0783a556cce1
-
SHA256
8e853d68c303ff55e85082e83b45978a13fc2821a8363a1c1ad50cc2ddb6eb41
-
SHA512
521486297dc22c5f6e02dda6bca8789a13ed5d6d91bc1fed1342bcfcfabac3f0771e057d5afc1af1be8ca9552b80a0e81b93e7b5a90c81c803b2eb3485285c7f
Static task
static1
Behavioral task
behavioral1
Sample
8e853d68c303ff55e85082e83b45978a13fc2821a8363a1c1ad50cc2ddb6eb41.exe
Resource
win7-20220414-en
Malware Config
Extracted
systembc
advertrex20.xyz:4044
gentexman37.xyz:4044
Targets
-
-
Target
8e853d68c303ff55e85082e83b45978a13fc2821a8363a1c1ad50cc2ddb6eb41
-
Size
318KB
-
MD5
69ab4ae7051a7962e610f4a8cc56d634
-
SHA1
9275cfb1e28dc75e614ab1fc6b7d0783a556cce1
-
SHA256
8e853d68c303ff55e85082e83b45978a13fc2821a8363a1c1ad50cc2ddb6eb41
-
SHA512
521486297dc22c5f6e02dda6bca8789a13ed5d6d91bc1fed1342bcfcfabac3f0771e057d5afc1af1be8ca9552b80a0e81b93e7b5a90c81c803b2eb3485285c7f
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Uses Tor communications
Malware can proxy its traffic through Tor for more anonymity.
-