General
-
Target
56c03f607e5973dc81029419eaa383aa0e06c16ad9dcb5d49e6a9392e5a36b79
-
Size
319KB
-
Sample
220725-b8xznshhhn
-
MD5
6b0914e11a9e35bfd54f87a4aaaa0d8f
-
SHA1
b00b1cec7fd03a6f21125ee5cb24303c2eb47c74
-
SHA256
56c03f607e5973dc81029419eaa383aa0e06c16ad9dcb5d49e6a9392e5a36b79
-
SHA512
af8589ccb147bf1578dbc265a73fc62c51c95a47f8c6c189df66e677c8169c699688939614a59790cd5019f66690be2c63fca7befc02631ce7a31b66fce0347e
Static task
static1
Behavioral task
behavioral1
Sample
56c03f607e5973dc81029419eaa383aa0e06c16ad9dcb5d49e6a9392e5a36b79.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
56c03f607e5973dc81029419eaa383aa0e06c16ad9dcb5d49e6a9392e5a36b79.exe
Resource
win10v2004-20220721-en
Malware Config
Targets
-
-
Target
56c03f607e5973dc81029419eaa383aa0e06c16ad9dcb5d49e6a9392e5a36b79
-
Size
319KB
-
MD5
6b0914e11a9e35bfd54f87a4aaaa0d8f
-
SHA1
b00b1cec7fd03a6f21125ee5cb24303c2eb47c74
-
SHA256
56c03f607e5973dc81029419eaa383aa0e06c16ad9dcb5d49e6a9392e5a36b79
-
SHA512
af8589ccb147bf1578dbc265a73fc62c51c95a47f8c6c189df66e677c8169c699688939614a59790cd5019f66690be2c63fca7befc02631ce7a31b66fce0347e
-
suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole
suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-