General
-
Target
5674b9161e9a7ef4983670e64d78966c36761d1593207855dc34e011a0be48f8
-
Size
309KB
-
Sample
220725-dqzrnacegq
-
MD5
396a50aafb8a0a6f6f2e3ab7a984f0e5
-
SHA1
b060879f5b4874995359325e89744b8407c7ee8d
-
SHA256
5674b9161e9a7ef4983670e64d78966c36761d1593207855dc34e011a0be48f8
-
SHA512
835aded12c884f2629ce910a76aea176410eb2d0404ed73d4b22f959affb3cbca10881ff7f036094ecdf7a1c3ac587b9475fd1c2f03c058f4abc02b52fb55823
Static task
static1
Behavioral task
behavioral1
Sample
5674b9161e9a7ef4983670e64d78966c36761d1593207855dc34e011a0be48f8.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
5674b9161e9a7ef4983670e64d78966c36761d1593207855dc34e011a0be48f8.exe
Resource
win10v2004-20220722-en
Malware Config
Targets
-
-
Target
5674b9161e9a7ef4983670e64d78966c36761d1593207855dc34e011a0be48f8
-
Size
309KB
-
MD5
396a50aafb8a0a6f6f2e3ab7a984f0e5
-
SHA1
b060879f5b4874995359325e89744b8407c7ee8d
-
SHA256
5674b9161e9a7ef4983670e64d78966c36761d1593207855dc34e011a0be48f8
-
SHA512
835aded12c884f2629ce910a76aea176410eb2d0404ed73d4b22f959affb3cbca10881ff7f036094ecdf7a1c3ac587b9475fd1c2f03c058f4abc02b52fb55823
-
suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole
suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-