General
-
Target
ea4b1369c2b16be51c78e2a2734a16ea02784a2ab1edc05cc6613418d315d610
-
Size
713KB
-
Sample
220520-p3xnlscda5
-
MD5
5c9d5674d31ac4c6687372fd02bb1f57
-
SHA1
7fcc5bdad26e37f6933c60b8c3b73401bc301ee2
-
SHA256
ea4b1369c2b16be51c78e2a2734a16ea02784a2ab1edc05cc6613418d315d610
-
SHA512
6030b3cb6733d305ccae5f1f33917b6dc92a6b9cb0aa6260e3d5c05c4de9b668799306916f575b96d04c154850c3c53588190b211b6ef4c9c14650716c2e1b29
Static task
static1
Behavioral task
behavioral1
Sample
ea4b1369c2b16be51c78e2a2734a16ea02784a2ab1edc05cc6613418d315d610.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ea4b1369c2b16be51c78e2a2734a16ea02784a2ab1edc05cc6613418d315d610.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
ea4b1369c2b16be51c78e2a2734a16ea02784a2ab1edc05cc6613418d315d610
-
Size
713KB
-
MD5
5c9d5674d31ac4c6687372fd02bb1f57
-
SHA1
7fcc5bdad26e37f6933c60b8c3b73401bc301ee2
-
SHA256
ea4b1369c2b16be51c78e2a2734a16ea02784a2ab1edc05cc6613418d315d610
-
SHA512
6030b3cb6733d305ccae5f1f33917b6dc92a6b9cb0aa6260e3d5c05c4de9b668799306916f575b96d04c154850c3c53588190b211b6ef4c9c14650716c2e1b29
Score10/10-
suricata: ET MALWARE WebMonitor/RevCode RAT CnC Domain in DNS Lookup
suricata: ET MALWARE WebMonitor/RevCode RAT CnC Domain in DNS Lookup
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-