General
-
Target
57215fa8e239871d5d01952988568b76ddbc946909ce7e206add82233c71ba91
-
Size
220KB
-
Sample
220725-azb56sfgdj
-
MD5
0c552162f60fb671faa7446a355e92e2
-
SHA1
88d1a340c67069e6bed84851f779d43c3dea1e0a
-
SHA256
57215fa8e239871d5d01952988568b76ddbc946909ce7e206add82233c71ba91
-
SHA512
ed47d0bd18c7a114e86944520a89b43df188c1319dae3795cb8aac97fe1d24d972a5d4a9e21bed6cfd88b78d90d58c0070b6628bbd008d325c9bd55345165ea9
Static task
static1
Behavioral task
behavioral1
Sample
57215fa8e239871d5d01952988568b76ddbc946909ce7e206add82233c71ba91.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
57215fa8e239871d5d01952988568b76ddbc946909ce7e206add82233c71ba91.exe
Resource
win10v2004-20220722-en
Malware Config
Targets
-
-
Target
57215fa8e239871d5d01952988568b76ddbc946909ce7e206add82233c71ba91
-
Size
220KB
-
MD5
0c552162f60fb671faa7446a355e92e2
-
SHA1
88d1a340c67069e6bed84851f779d43c3dea1e0a
-
SHA256
57215fa8e239871d5d01952988568b76ddbc946909ce7e206add82233c71ba91
-
SHA512
ed47d0bd18c7a114e86944520a89b43df188c1319dae3795cb8aac97fe1d24d972a5d4a9e21bed6cfd88b78d90d58c0070b6628bbd008d325c9bd55345165ea9
-
suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole
suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-