General
-
Target
128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f
-
Size
459KB
-
Sample
220603-slznesafh9
-
MD5
b2ef28ee87bc3d936e128faa4fd89bb8
-
SHA1
0f27b77ac9caac0dbfbb88acd02025766c72c64e
-
SHA256
128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f
-
SHA512
5604591119b1a07d1bcfa2c2f365e3fa35c02871f1ebaa8c71b9a5b4ec75d9d73fc2b1073c3ecf282b575bbf8e9cd1d6a7ff050cdcceba5394a2cdfbad386bd2
Static task
static1
Behavioral task
behavioral1
Sample
128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f.exe
Resource
win7-20220414-en
Malware Config
Targets
-
-
Target
128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f
-
Size
459KB
-
MD5
b2ef28ee87bc3d936e128faa4fd89bb8
-
SHA1
0f27b77ac9caac0dbfbb88acd02025766c72c64e
-
SHA256
128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f
-
SHA512
5604591119b1a07d1bcfa2c2f365e3fa35c02871f1ebaa8c71b9a5b4ec75d9d73fc2b1073c3ecf282b575bbf8e9cd1d6a7ff050cdcceba5394a2cdfbad386bd2
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Uses Tor communications
Malware can proxy its traffic through Tor for more anonymity.
-
Suspicious use of SetThreadContext
-