General
-
Target
20a38edb69bbffc209eda8de54d07fdd4ac72767e9683988fa0efa4701c5b305
-
Size
1.4MB
-
Sample
220612-n2rkjaadhq
-
MD5
fa95d991efaa8f38bfc2e77e664ad735
-
SHA1
9352e5aed4dfe0ce209c811e0fa73e9601fbc663
-
SHA256
20a38edb69bbffc209eda8de54d07fdd4ac72767e9683988fa0efa4701c5b305
-
SHA512
8551d648dee184b2d9fe36d13917413e18de340c8f4536902ccd58a99da772e2aa9ec2969216fdd370b355082590e5e111ebca655b21e6d4c5b2f020bde7ea61
Static task
static1
Behavioral task
behavioral1
Sample
20a38edb69bbffc209eda8de54d07fdd4ac72767e9683988fa0efa4701c5b305.exe
Resource
win7-20220414-en
Malware Config
Extracted
socelars
https://sa-us-bucket.s3.us-east-2.amazonaws.com/usahd1/
Targets
-
-
Target
20a38edb69bbffc209eda8de54d07fdd4ac72767e9683988fa0efa4701c5b305
-
Size
1.4MB
-
MD5
fa95d991efaa8f38bfc2e77e664ad735
-
SHA1
9352e5aed4dfe0ce209c811e0fa73e9601fbc663
-
SHA256
20a38edb69bbffc209eda8de54d07fdd4ac72767e9683988fa0efa4701c5b305
-
SHA512
8551d648dee184b2d9fe36d13917413e18de340c8f4536902ccd58a99da772e2aa9ec2969216fdd370b355082590e5e111ebca655b21e6d4c5b2f020bde7ea61
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-