General
-
Target
56e513ef36c46d14e199eb96706aa42cfbcebc7ac8897bfcd26cf53893eafa01
-
Size
257KB
-
Sample
220725-brm35shbdp
-
MD5
7c65e80b914e89ef4d66d9a11da8810a
-
SHA1
87db4d7e89f3034a1e5ca2a81e903db4c803b3c0
-
SHA256
56e513ef36c46d14e199eb96706aa42cfbcebc7ac8897bfcd26cf53893eafa01
-
SHA512
254c00a1edb54a8872096e0334175b8914d7cdb06c6a5657cb0f6a661fa9ad1ee404744272a30ac8e1337fbf005bed5d549c657b1684b25ffd6b04e62ba6bf48
Static task
static1
Behavioral task
behavioral1
Sample
56e513ef36c46d14e199eb96706aa42cfbcebc7ac8897bfcd26cf53893eafa01.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
56e513ef36c46d14e199eb96706aa42cfbcebc7ac8897bfcd26cf53893eafa01.exe
Resource
win10v2004-20220721-en
Malware Config
Targets
-
-
Target
56e513ef36c46d14e199eb96706aa42cfbcebc7ac8897bfcd26cf53893eafa01
-
Size
257KB
-
MD5
7c65e80b914e89ef4d66d9a11da8810a
-
SHA1
87db4d7e89f3034a1e5ca2a81e903db4c803b3c0
-
SHA256
56e513ef36c46d14e199eb96706aa42cfbcebc7ac8897bfcd26cf53893eafa01
-
SHA512
254c00a1edb54a8872096e0334175b8914d7cdb06c6a5657cb0f6a661fa9ad1ee404744272a30ac8e1337fbf005bed5d549c657b1684b25ffd6b04e62ba6bf48
-
suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole
suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-