General
-
Target
6392b4578b3ae0dc27dc616e45347b2396425d90ec92f6ad28ef4af355c19a72
-
Size
623KB
-
Sample
220731-hbe6xscgf2
-
MD5
80193d630c9767cfa8f78234b5d2dbd5
-
SHA1
3c9e6af76e6e2cf3009ffe61a5525d1052e73b93
-
SHA256
6392b4578b3ae0dc27dc616e45347b2396425d90ec92f6ad28ef4af355c19a72
-
SHA512
dd296b327e464590a4024a52512a64d24d4af09e0f5fa94ab3526856eb6e4eacc10e92579687543eb1d5bbc7c5c67d3e098574ba4e8c785d26eb4c21c6bd8203
Static task
static1
Behavioral task
behavioral1
Sample
6392b4578b3ae0dc27dc616e45347b2396425d90ec92f6ad28ef4af355c19a72.exe
Resource
win7-20220718-en
Malware Config
Targets
-
-
Target
6392b4578b3ae0dc27dc616e45347b2396425d90ec92f6ad28ef4af355c19a72
-
Size
623KB
-
MD5
80193d630c9767cfa8f78234b5d2dbd5
-
SHA1
3c9e6af76e6e2cf3009ffe61a5525d1052e73b93
-
SHA256
6392b4578b3ae0dc27dc616e45347b2396425d90ec92f6ad28ef4af355c19a72
-
SHA512
dd296b327e464590a4024a52512a64d24d4af09e0f5fa94ab3526856eb6e4eacc10e92579687543eb1d5bbc7c5c67d3e098574ba4e8c785d26eb4c21c6bd8203
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Uses Tor communications
Malware can proxy its traffic through Tor for more anonymity.
-