General
-
Target
2adac2d98bc23fcfb1178236355ba2538d77d7ed14d11b4e0773a859aadb37b7
-
Size
4.0MB
-
Sample
220923-srpqeaagbm
-
MD5
2407b734ad5f8d9839bb6c59437cc955
-
SHA1
1888ff058ef29ab181066d242c30467b2fdd4b54
-
SHA256
2adac2d98bc23fcfb1178236355ba2538d77d7ed14d11b4e0773a859aadb37b7
-
SHA512
cf585ad15778e7bb78ca18cda17bb49616df2ede0702beac7024563d8ff560bfe5e53a939e651993ad54f126b93ff210e37f61f10090225cd82d52a8f92e4eab
-
SSDEEP
98304:9ErKlf0+NjGcnMybUNudFu6Zs2wa2/kOI2MUE3eglt2cu66IyI:IQRfnMctdqfa2/kr2DEuh66s
Static task
static1
Malware Config
Targets
-
-
Target
2adac2d98bc23fcfb1178236355ba2538d77d7ed14d11b4e0773a859aadb37b7
-
Size
4.0MB
-
MD5
2407b734ad5f8d9839bb6c59437cc955
-
SHA1
1888ff058ef29ab181066d242c30467b2fdd4b54
-
SHA256
2adac2d98bc23fcfb1178236355ba2538d77d7ed14d11b4e0773a859aadb37b7
-
SHA512
cf585ad15778e7bb78ca18cda17bb49616df2ede0702beac7024563d8ff560bfe5e53a939e651993ad54f126b93ff210e37f61f10090225cd82d52a8f92e4eab
-
SSDEEP
98304:9ErKlf0+NjGcnMybUNudFu6Zs2wa2/kOI2MUE3eglt2cu66IyI:IQRfnMctdqfa2/kr2DEuh66s
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-