General
-
Target
2a22705bcb3825714ab77596384746d2ad91915c34368b4521d08b53d0ca15a7
-
Size
4.0MB
-
Sample
220827-j3m7aahcc8
-
MD5
3c622d652dbe718a118d3779a3cc4911
-
SHA1
6a60a9eec670c5220cb0a6f67876e926c69fb281
-
SHA256
2a22705bcb3825714ab77596384746d2ad91915c34368b4521d08b53d0ca15a7
-
SHA512
21d7ef1209328777aad7a45f366ad9357195d3fc6b254c5a63103a91f553deca37f7e2a3629aab1892c7ca76c193fc3ff08e1a7b6d29e3e8ff8eb7496f3b9072
-
SSDEEP
98304:FsGQwKRV9jS2+ERfdeZhMSmax2CdNeHfvPWJPbyR7bgJcAm:dQfj7RfKMSJ2Cdk/vPubyR70Lm
Static task
static1
Malware Config
Targets
-
-
Target
2a22705bcb3825714ab77596384746d2ad91915c34368b4521d08b53d0ca15a7
-
Size
4.0MB
-
MD5
3c622d652dbe718a118d3779a3cc4911
-
SHA1
6a60a9eec670c5220cb0a6f67876e926c69fb281
-
SHA256
2a22705bcb3825714ab77596384746d2ad91915c34368b4521d08b53d0ca15a7
-
SHA512
21d7ef1209328777aad7a45f366ad9357195d3fc6b254c5a63103a91f553deca37f7e2a3629aab1892c7ca76c193fc3ff08e1a7b6d29e3e8ff8eb7496f3b9072
-
SSDEEP
98304:FsGQwKRV9jS2+ERfdeZhMSmax2CdNeHfvPWJPbyR7bgJcAm:dQfj7RfKMSJ2Cdk/vPubyR70Lm
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-