General
-
Target
56799f1daa228d51a76da138321f2680f4f146446783201b3ff88b0936223a0c
-
Size
2.0MB
-
Sample
220725-dm47zacdfl
-
MD5
5f859a0dd3f34bc1cfee3050fe7cea35
-
SHA1
ba48ba0602cad6dda16979b6af30a41ee6cc0410
-
SHA256
56799f1daa228d51a76da138321f2680f4f146446783201b3ff88b0936223a0c
-
SHA512
ec39b5c73163db57455448fa165f94c9fd8f24acf8db004d512da92e4fecedf121a08f4cd2c63eb4eae1bc7c77f6e2343af890e9d491464da7417f5ebb2366b5
Static task
static1
Behavioral task
behavioral1
Sample
56799f1daa228d51a76da138321f2680f4f146446783201b3ff88b0936223a0c.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
56799f1daa228d51a76da138321f2680f4f146446783201b3ff88b0936223a0c.exe
Resource
win10v2004-20220721-en
Malware Config
Targets
-
-
Target
56799f1daa228d51a76da138321f2680f4f146446783201b3ff88b0936223a0c
-
Size
2.0MB
-
MD5
5f859a0dd3f34bc1cfee3050fe7cea35
-
SHA1
ba48ba0602cad6dda16979b6af30a41ee6cc0410
-
SHA256
56799f1daa228d51a76da138321f2680f4f146446783201b3ff88b0936223a0c
-
SHA512
ec39b5c73163db57455448fa165f94c9fd8f24acf8db004d512da92e4fecedf121a08f4cd2c63eb4eae1bc7c77f6e2343af890e9d491464da7417f5ebb2366b5
-
suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole
suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-