General
-
Target
7cfab5299b7f6362151a7eab77102d7abc2f6c9d85773004103f546b93af9a78
-
Size
181KB
-
Sample
221002-qbakfagae7
-
MD5
635225e40d1ab681b657b5e21dd23f32
-
SHA1
6c2ea698bdfb75d8c976a204d9dbafd7487eee93
-
SHA256
7cfab5299b7f6362151a7eab77102d7abc2f6c9d85773004103f546b93af9a78
-
SHA512
fc77ed1546df1ddf4e13d892f54d7f0acf7dca15ee62a9e25ab1694f53eaaab3e954780b060c61c960b066db0a46f5ba77c83f941ff2b9ccf929258a162d1dd8
-
SSDEEP
3072:Q9lHbd/xC9lcdk7VrveYRsYNqDrZCG5GUrKBq4YsPmSq5sCsP6kEt9ofCESsRRcE:Qfbd/xC9r73WogrZ95GUrAq4LatYVBSY
Static task
static1
Behavioral task
behavioral1
Sample
7cfab5299b7f6362151a7eab77102d7abc2f6c9d85773004103f546b93af9a78.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7cfab5299b7f6362151a7eab77102d7abc2f6c9d85773004103f546b93af9a78.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
7cfab5299b7f6362151a7eab77102d7abc2f6c9d85773004103f546b93af9a78
-
Size
181KB
-
MD5
635225e40d1ab681b657b5e21dd23f32
-
SHA1
6c2ea698bdfb75d8c976a204d9dbafd7487eee93
-
SHA256
7cfab5299b7f6362151a7eab77102d7abc2f6c9d85773004103f546b93af9a78
-
SHA512
fc77ed1546df1ddf4e13d892f54d7f0acf7dca15ee62a9e25ab1694f53eaaab3e954780b060c61c960b066db0a46f5ba77c83f941ff2b9ccf929258a162d1dd8
-
SSDEEP
3072:Q9lHbd/xC9lcdk7VrveYRsYNqDrZCG5GUrKBq4YsPmSq5sCsP6kEt9ofCESsRRcE:Qfbd/xC9r73WogrZ95GUrAq4LatYVBSY
Score8/10-
Executes dropped EXE
-
Registers COM server for autorun
-
Deletes itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-