General
-
Target
354fed4072f0c12b9a7e40f48feb32c043481d0a87fbff599ce36fd2e323d379
-
Size
697KB
-
Sample
220504-tlsqjsghhl
-
MD5
3523aba425931e1afbe4864ae714beb1
-
SHA1
38e49f28a2f36eb1346eec18083c6a6b3e7ab4d7
-
SHA256
354fed4072f0c12b9a7e40f48feb32c043481d0a87fbff599ce36fd2e323d379
-
SHA512
973a8a551c38d7efc5f3d21ae0d34b053f8330cec858814d06384b9a7bc12ef1e97fb3d4ce0bd638ab79e0c1f297af61a430c5f1ab81666127abd8d331c069dc
Static task
static1
Malware Config
Targets
-
-
Target
354fed4072f0c12b9a7e40f48feb32c043481d0a87fbff599ce36fd2e323d379
-
Size
697KB
-
MD5
3523aba425931e1afbe4864ae714beb1
-
SHA1
38e49f28a2f36eb1346eec18083c6a6b3e7ab4d7
-
SHA256
354fed4072f0c12b9a7e40f48feb32c043481d0a87fbff599ce36fd2e323d379
-
SHA512
973a8a551c38d7efc5f3d21ae0d34b053f8330cec858814d06384b9a7bc12ef1e97fb3d4ce0bd638ab79e0c1f297af61a430c5f1ab81666127abd8d331c069dc
-
Detects PlugX Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-