General
-
Target
5772bc1b153c9fd2a32dcd3e350b31d86c145fb1b16d98838773f89fb41d2005
-
Size
310KB
-
Sample
220724-2cyjfabaan
-
MD5
2a491604dc5ac8aa28a5d759cf290d89
-
SHA1
a242244245337e4d7794f2c6f31195a3ed0986b9
-
SHA256
5772bc1b153c9fd2a32dcd3e350b31d86c145fb1b16d98838773f89fb41d2005
-
SHA512
32059fb37b59d275943de80cd81b9b9e62792976c898cb10ee47ca6385075ffa723af02e82a4c9110d7e40e63c88a7c4a7ebf38e9e2fc79ddfe095aa8ed6fced
Static task
static1
Behavioral task
behavioral1
Sample
5772bc1b153c9fd2a32dcd3e350b31d86c145fb1b16d98838773f89fb41d2005.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
5772bc1b153c9fd2a32dcd3e350b31d86c145fb1b16d98838773f89fb41d2005.exe
Resource
win10v2004-20220721-en
Malware Config
Targets
-
-
Target
5772bc1b153c9fd2a32dcd3e350b31d86c145fb1b16d98838773f89fb41d2005
-
Size
310KB
-
MD5
2a491604dc5ac8aa28a5d759cf290d89
-
SHA1
a242244245337e4d7794f2c6f31195a3ed0986b9
-
SHA256
5772bc1b153c9fd2a32dcd3e350b31d86c145fb1b16d98838773f89fb41d2005
-
SHA512
32059fb37b59d275943de80cd81b9b9e62792976c898cb10ee47ca6385075ffa723af02e82a4c9110d7e40e63c88a7c4a7ebf38e9e2fc79ddfe095aa8ed6fced
-
suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole
suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-