General
-
Target
2b61b3b00aa5d548e41dc305cb1271c26dc387601a7a7cdb63600b49c270bb30
-
Size
184KB
-
Sample
220615-cvcl9agefn
-
MD5
d103074755792906a0aab038103444e3
-
SHA1
ffb8d5a1d2d3dda1fa013168017bd833aaa28064
-
SHA256
2b61b3b00aa5d548e41dc305cb1271c26dc387601a7a7cdb63600b49c270bb30
-
SHA512
30be12dba187e19d797e6a5b502185ac37848ef80e9431e0cfb98c4b64c104f122fa2101538a0805513b7658bc8585a31ce0a8f00b725f33b8f70645e82e4660
Static task
static1
Behavioral task
behavioral1
Sample
2b61b3b00aa5d548e41dc305cb1271c26dc387601a7a7cdb63600b49c270bb30.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
2b61b3b00aa5d548e41dc305cb1271c26dc387601a7a7cdb63600b49c270bb30.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
http://legion17.com/legion17/welcome
Targets
-
-
Target
2b61b3b00aa5d548e41dc305cb1271c26dc387601a7a7cdb63600b49c270bb30
-
Size
184KB
-
MD5
d103074755792906a0aab038103444e3
-
SHA1
ffb8d5a1d2d3dda1fa013168017bd833aaa28064
-
SHA256
2b61b3b00aa5d548e41dc305cb1271c26dc387601a7a7cdb63600b49c270bb30
-
SHA512
30be12dba187e19d797e6a5b502185ac37848ef80e9431e0cfb98c4b64c104f122fa2101538a0805513b7658bc8585a31ce0a8f00b725f33b8f70645e82e4660
Score10/10-
Blocklisted process makes network request
-
Legitimate hosting services abused for malware hosting/C2
-