General
-
Target
ffa5fba6c98ac5e0dbb79120946deee547f30298b5b774fbf307315346fad8c9
-
Size
155KB
-
Sample
221002-ntbjcaehej
-
MD5
4d00c10c76a7009e48af57cd0202e8a6
-
SHA1
ef147f408779aae5267a274ded043b4288e7e9b0
-
SHA256
ffa5fba6c98ac5e0dbb79120946deee547f30298b5b774fbf307315346fad8c9
-
SHA512
de6d0d78fa2860b11ed2ad2133e1e79505d18fa237246c00d1825cba65adda288095f01cd16ae9f1111dea51af5d9a7c39fa05b60dad6e08b492dc0f7836bc3a
-
SSDEEP
3072:RJXxP9j/dOBwFk/VYF6/K1NClnObyXI0fIXnp96rTwnukHjw4lksS8:RNxPxduf/k6Oowk8lfS8
Static task
static1
Behavioral task
behavioral1
Sample
ffa5fba6c98ac5e0dbb79120946deee547f30298b5b774fbf307315346fad8c9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ffa5fba6c98ac5e0dbb79120946deee547f30298b5b774fbf307315346fad8c9.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
ffa5fba6c98ac5e0dbb79120946deee547f30298b5b774fbf307315346fad8c9
-
Size
155KB
-
MD5
4d00c10c76a7009e48af57cd0202e8a6
-
SHA1
ef147f408779aae5267a274ded043b4288e7e9b0
-
SHA256
ffa5fba6c98ac5e0dbb79120946deee547f30298b5b774fbf307315346fad8c9
-
SHA512
de6d0d78fa2860b11ed2ad2133e1e79505d18fa237246c00d1825cba65adda288095f01cd16ae9f1111dea51af5d9a7c39fa05b60dad6e08b492dc0f7836bc3a
-
SSDEEP
3072:RJXxP9j/dOBwFk/VYF6/K1NClnObyXI0fIXnp96rTwnukHjw4lksS8:RNxPxduf/k6Oowk8lfS8
Score8/10-
Executes dropped EXE
-
Registers COM server for autorun
-
Deletes itself
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-