General
-
Target
55f3cbcaa6d810500eafcb38964edabf3448acdd856b480af3548f3a00c8c063
-
Size
245KB
-
Sample
220725-g3294aadhk
-
MD5
2711ed38244626962bd768e14fe98828
-
SHA1
84e2e522ef8deb105ea16bb2d07b34d5cd809077
-
SHA256
55f3cbcaa6d810500eafcb38964edabf3448acdd856b480af3548f3a00c8c063
-
SHA512
1475fff672c42b07a940631321ab8a718be4b00e8ff7650aa567cd530b6f10216ce51c3cb2f504704189d0204bd379f49cd4343e021c2e0aa6c8b0a69cc77efc
Static task
static1
Behavioral task
behavioral1
Sample
55f3cbcaa6d810500eafcb38964edabf3448acdd856b480af3548f3a00c8c063.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
55f3cbcaa6d810500eafcb38964edabf3448acdd856b480af3548f3a00c8c063.exe
Resource
win10v2004-20220721-en
Malware Config
Targets
-
-
Target
55f3cbcaa6d810500eafcb38964edabf3448acdd856b480af3548f3a00c8c063
-
Size
245KB
-
MD5
2711ed38244626962bd768e14fe98828
-
SHA1
84e2e522ef8deb105ea16bb2d07b34d5cd809077
-
SHA256
55f3cbcaa6d810500eafcb38964edabf3448acdd856b480af3548f3a00c8c063
-
SHA512
1475fff672c42b07a940631321ab8a718be4b00e8ff7650aa567cd530b6f10216ce51c3cb2f504704189d0204bd379f49cd4343e021c2e0aa6c8b0a69cc77efc
-
suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole
suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-