Analysis
-
max time network
163s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
24-05-2022 16:25
Behavioral task
behavioral1
Sample
4e9e02f9b59d580cee08f8f3e7804f7a8f8b12c93e027ba6fd211ac4815e98fa.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
4e9e02f9b59d580cee08f8f3e7804f7a8f8b12c93e027ba6fd211ac4815e98fa.exe
-
Size
348KB
-
MD5
6e5fef5da8810aa3fffad5a486c68cf3
-
SHA1
70f6507e9b2644fbcb75c78c6660dbdca4da5ef0
-
SHA256
4e9e02f9b59d580cee08f8f3e7804f7a8f8b12c93e027ba6fd211ac4815e98fa
-
SHA512
94dec0822aef151ec843732e9f13d550c59bb4575f8fff7822f5c2bf4d36854dc0c4061dbbcd6c2377aaac77ad86aa48092515fdc7388148e76db96f8417d027
Score
10/10
Malware Config
Signatures
-
suricata: ET MALWARE Common RAT Connectivity Check Observed
suricata: ET MALWARE Common RAT Connectivity Check Observed
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 ip-api.com