General
-
Target
979f2ed8655f2c3a9afaf215f994d7675310f469f7d809c4b2e4b4d562e62201
-
Size
1.6MB
-
Sample
220516-nzgmjscgfn
-
MD5
05f759a6828ec97540938144e380fbef
-
SHA1
6b288c6567a853264f2dec9c643517e46726748f
-
SHA256
979f2ed8655f2c3a9afaf215f994d7675310f469f7d809c4b2e4b4d562e62201
-
SHA512
0be0e7022f1c12ea5b606558a5bd0e4d00404a596bfb862c59ec85c67f4b96402aba67e51981f690157da58b954c836e8f96c6da33f1e8a39c0c1d80fa6152a9
Behavioral task
behavioral1
Sample
979f2ed8655f2c3a9afaf215f994d7675310f469f7d809c4b2e4b4d562e62201.exe
Resource
win7-20220414-en
Malware Config
Targets
-
-
Target
979f2ed8655f2c3a9afaf215f994d7675310f469f7d809c4b2e4b4d562e62201
-
Size
1.6MB
-
MD5
05f759a6828ec97540938144e380fbef
-
SHA1
6b288c6567a853264f2dec9c643517e46726748f
-
SHA256
979f2ed8655f2c3a9afaf215f994d7675310f469f7d809c4b2e4b4d562e62201
-
SHA512
0be0e7022f1c12ea5b606558a5bd0e4d00404a596bfb862c59ec85c67f4b96402aba67e51981f690157da58b954c836e8f96c6da33f1e8a39c0c1d80fa6152a9
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-