General
-
Target
bf0bfdf017bdce9ba2359784a42c4ce7ee3e1a6ce47716e0b31c40be8c61e18a
-
Size
472KB
-
Sample
220701-dzp9ksabaq
-
MD5
46f2c5f4ba116e0abdc2165778adaa3a
-
SHA1
27aad7de7c4f686992c9c378992f50d4e38445e3
-
SHA256
bf0bfdf017bdce9ba2359784a42c4ce7ee3e1a6ce47716e0b31c40be8c61e18a
-
SHA512
829b4eee0fe22febecb19a88064f420f46915b0716477e59613d378c1f5ab9becca3db62c841e1077a2af5f2fbbce54d16ff0821d64b1fffcf7494497a91d68e
Static task
static1
Behavioral task
behavioral1
Sample
bf0bfdf017bdce9ba2359784a42c4ce7ee3e1a6ce47716e0b31c40be8c61e18a.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
bf0bfdf017bdce9ba2359784a42c4ce7ee3e1a6ce47716e0b31c40be8c61e18a.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
bf0bfdf017bdce9ba2359784a42c4ce7ee3e1a6ce47716e0b31c40be8c61e18a
-
Size
472KB
-
MD5
46f2c5f4ba116e0abdc2165778adaa3a
-
SHA1
27aad7de7c4f686992c9c378992f50d4e38445e3
-
SHA256
bf0bfdf017bdce9ba2359784a42c4ce7ee3e1a6ce47716e0b31c40be8c61e18a
-
SHA512
829b4eee0fe22febecb19a88064f420f46915b0716477e59613d378c1f5ab9becca3db62c841e1077a2af5f2fbbce54d16ff0821d64b1fffcf7494497a91d68e
-
Detects PlugX Payload
-
suricata: ET MALWARE Trojan.Win32.DLOADR.TIOIBEPQ CnC Traffic
suricata: ET MALWARE Trojan.Win32.DLOADR.TIOIBEPQ CnC Traffic
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-