Analysis
-
max time kernel
152s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
15-05-2022 21:18
Static task
static1
Behavioral task
behavioral1
Sample
fd1bb76f68b7b1d8e66bda211285afc41b41b5e97bdf015f761c74101055b6e3.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
fd1bb76f68b7b1d8e66bda211285afc41b41b5e97bdf015f761c74101055b6e3.exe
Resource
win10v2004-20220414-en
General
-
Target
fd1bb76f68b7b1d8e66bda211285afc41b41b5e97bdf015f761c74101055b6e3.exe
-
Size
1.8MB
-
MD5
57fd66671e3f9c3ed96e268bba6524be
-
SHA1
85b0e5e80b4c3f3662d170fdc850b06c5273c5a7
-
SHA256
fd1bb76f68b7b1d8e66bda211285afc41b41b5e97bdf015f761c74101055b6e3
-
SHA512
7fec95775b3d0acb1fb20d86bbd94522a2320c39082278f758ea999cc36d02673657bcdb0f2108a04245322739c9776b458b707bf08d03a4ea10dc7a82dd554e
Malware Config
Extracted
sendsafe
UNREGISTERED
31.44.184.95:50003
31.44.184.95:50004
-
service_name
Enterprise Mailing Service
Signatures
-
SendSafe Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2228-131-0x0000000000400000-0x00000000005D9000-memory.dmp sendsafe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
fd1bb76f68b7b1d8e66bda211285afc41b41b5e97bdf015f761c74101055b6e3.exepid process 2228 fd1bb76f68b7b1d8e66bda211285afc41b41b5e97bdf015f761c74101055b6e3.exe 2228 fd1bb76f68b7b1d8e66bda211285afc41b41b5e97bdf015f761c74101055b6e3.exe