General
-
Target
156a15f3a6f9221792f48e6a8665b92fc6907b7f38e6430a5adccdc4b53170d0
-
Size
164KB
-
Sample
220609-h16p6sebh6
-
MD5
d2a3ac7b7f79cdd211590623ebfde0dc
-
SHA1
086cb767e2fc5e058b14643fa803140e0656fcda
-
SHA256
156a15f3a6f9221792f48e6a8665b92fc6907b7f38e6430a5adccdc4b53170d0
-
SHA512
bc88ec4006734a34669fdd003d729561f0c89a56f3b738c953700f6211b1a0e5f706382809897f8d0c4923e23a5a3133a6d5474f23be62d09666a36bda4d11af
Static task
static1
Behavioral task
behavioral1
Sample
156a15f3a6f9221792f48e6a8665b92fc6907b7f38e6430a5adccdc4b53170d0.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
156a15f3a6f9221792f48e6a8665b92fc6907b7f38e6430a5adccdc4b53170d0.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
Protocol: ftp- Host:
194.236.7.34 - Port:
21 - Username:
coop-mp - Password:
klyn65te
Targets
-
-
Target
156a15f3a6f9221792f48e6a8665b92fc6907b7f38e6430a5adccdc4b53170d0
-
Size
164KB
-
MD5
d2a3ac7b7f79cdd211590623ebfde0dc
-
SHA1
086cb767e2fc5e058b14643fa803140e0656fcda
-
SHA256
156a15f3a6f9221792f48e6a8665b92fc6907b7f38e6430a5adccdc4b53170d0
-
SHA512
bc88ec4006734a34669fdd003d729561f0c89a56f3b738c953700f6211b1a0e5f706382809897f8d0c4923e23a5a3133a6d5474f23be62d09666a36bda4d11af
-
Blocklisted process makes network request
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-