General
-
Target
262f5901d5463b9d191893b4873cd9e88d3c87f43e91d1f984d956167c063041
-
Size
184KB
-
Sample
220616-lbw18afah3
-
MD5
2822431899265acfe0116a193ff7eb86
-
SHA1
19b65753f8b60664b371b28680b5d4ce7660af2a
-
SHA256
262f5901d5463b9d191893b4873cd9e88d3c87f43e91d1f984d956167c063041
-
SHA512
11bf4b1bc5217564c03811608ad7adce819925dd47daa6f01eca31a9f0aa46f519b93635efc44f7e7422f44650cb2fa6d4f024dbf52dfb77e26ccb6793267797
Static task
static1
Behavioral task
behavioral1
Sample
262f5901d5463b9d191893b4873cd9e88d3c87f43e91d1f984d956167c063041.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
262f5901d5463b9d191893b4873cd9e88d3c87f43e91d1f984d956167c063041.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
http://legion17.com/legion17/welcome
Targets
-
-
Target
262f5901d5463b9d191893b4873cd9e88d3c87f43e91d1f984d956167c063041
-
Size
184KB
-
MD5
2822431899265acfe0116a193ff7eb86
-
SHA1
19b65753f8b60664b371b28680b5d4ce7660af2a
-
SHA256
262f5901d5463b9d191893b4873cd9e88d3c87f43e91d1f984d956167c063041
-
SHA512
11bf4b1bc5217564c03811608ad7adce819925dd47daa6f01eca31a9f0aa46f519b93635efc44f7e7422f44650cb2fa6d4f024dbf52dfb77e26ccb6793267797
Score10/10-
Blocklisted process makes network request
-
Legitimate hosting services abused for malware hosting/C2
-