General
-
Target
062fa93b9b238dc968bef952ba2ff781a2ceb72fe15e33150a8d23f3c7c3b438
-
Size
2.2MB
-
Sample
220516-pwz56aeddl
-
MD5
05742434e14c94a052151489b1a72499
-
SHA1
390ae8fb10d2a7d8d89fbd60b54fb8e294190fd6
-
SHA256
062fa93b9b238dc968bef952ba2ff781a2ceb72fe15e33150a8d23f3c7c3b438
-
SHA512
f7a3e2e4c817218c754f2dfb2c60622426b23488fb2ba0dcd1d448c3b304e723bd71a2ae2c04d1c989b540e7bbb6f62229a7039ed2674e9cf56a7324464807bd
Behavioral task
behavioral1
Sample
062fa93b9b238dc968bef952ba2ff781a2ceb72fe15e33150a8d23f3c7c3b438.exe
Resource
win7-20220414-en
Malware Config
Targets
-
-
Target
062fa93b9b238dc968bef952ba2ff781a2ceb72fe15e33150a8d23f3c7c3b438
-
Size
2.2MB
-
MD5
05742434e14c94a052151489b1a72499
-
SHA1
390ae8fb10d2a7d8d89fbd60b54fb8e294190fd6
-
SHA256
062fa93b9b238dc968bef952ba2ff781a2ceb72fe15e33150a8d23f3c7c3b438
-
SHA512
f7a3e2e4c817218c754f2dfb2c60622426b23488fb2ba0dcd1d448c3b304e723bd71a2ae2c04d1c989b540e7bbb6f62229a7039ed2674e9cf56a7324464807bd
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-