General
-
Target
11b3a0c7a1aac1403e848e9cdfba5ea7caf9f566c8a68208c54be846f7adca1c
-
Size
2.2MB
-
Sample
220516-pterfaeccq
-
MD5
bb33c24c36ca8dcc725335628b837681
-
SHA1
ba3aa429645487cef755eadf39407730d1871c1a
-
SHA256
11b3a0c7a1aac1403e848e9cdfba5ea7caf9f566c8a68208c54be846f7adca1c
-
SHA512
cf394d36f51c1c63f4a34b7bfcb04b4a332698d16778757c45a02d3b3a66f9dc9ea1c3feecc4c6903a75474215e7cbcd5606ef221b088666b1fb414690235e7e
Behavioral task
behavioral1
Sample
11b3a0c7a1aac1403e848e9cdfba5ea7caf9f566c8a68208c54be846f7adca1c.exe
Resource
win7-20220414-en
Malware Config
Targets
-
-
Target
11b3a0c7a1aac1403e848e9cdfba5ea7caf9f566c8a68208c54be846f7adca1c
-
Size
2.2MB
-
MD5
bb33c24c36ca8dcc725335628b837681
-
SHA1
ba3aa429645487cef755eadf39407730d1871c1a
-
SHA256
11b3a0c7a1aac1403e848e9cdfba5ea7caf9f566c8a68208c54be846f7adca1c
-
SHA512
cf394d36f51c1c63f4a34b7bfcb04b4a332698d16778757c45a02d3b3a66f9dc9ea1c3feecc4c6903a75474215e7cbcd5606ef221b088666b1fb414690235e7e
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-