General
-
Target
560ece3196de4196d48e7debd0ef9f11f3635f40ab9eb90ca3ed3263937d762a
-
Size
309KB
-
Sample
220725-gqg4dshgfp
-
MD5
8209616edabc2f895d3e394a678adbac
-
SHA1
08db48caa07b2565bdbb419fd649f2de12c8ffbf
-
SHA256
560ece3196de4196d48e7debd0ef9f11f3635f40ab9eb90ca3ed3263937d762a
-
SHA512
e8719ee7b426f932f601dbe340e52c2cafcf37e248591796606224f353d4992ff991d3b9b714bb10e92321f7b8ca8d6dc52de7970969f50761a3733e38913cc7
Static task
static1
Behavioral task
behavioral1
Sample
560ece3196de4196d48e7debd0ef9f11f3635f40ab9eb90ca3ed3263937d762a.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
560ece3196de4196d48e7debd0ef9f11f3635f40ab9eb90ca3ed3263937d762a.exe
Resource
win10v2004-20220721-en
Malware Config
Targets
-
-
Target
560ece3196de4196d48e7debd0ef9f11f3635f40ab9eb90ca3ed3263937d762a
-
Size
309KB
-
MD5
8209616edabc2f895d3e394a678adbac
-
SHA1
08db48caa07b2565bdbb419fd649f2de12c8ffbf
-
SHA256
560ece3196de4196d48e7debd0ef9f11f3635f40ab9eb90ca3ed3263937d762a
-
SHA512
e8719ee7b426f932f601dbe340e52c2cafcf37e248591796606224f353d4992ff991d3b9b714bb10e92321f7b8ca8d6dc52de7970969f50761a3733e38913cc7
-
suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole
suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-