General
-
Target
dfea0b49c1cfa9fbd0aa168fe740a70d6eab0c40e544e9b105ce8fb3eed795e1
-
Size
206KB
-
Sample
221003-cj3pasbfh4
-
MD5
024f08de698b6b7e784214f4fcaa05a4
-
SHA1
e2ba2fc3ef2b8b97a7ed500633cda58fdd652a93
-
SHA256
dfea0b49c1cfa9fbd0aa168fe740a70d6eab0c40e544e9b105ce8fb3eed795e1
-
SHA512
b94e940653076d29c780c2ecb4f4910737404f9f8861b14b254f06069616962f12c7976bcc8bc30f7a04596432988c6db2ac949011e7d92414e2e7672b2c3084
-
SSDEEP
3072:7YbzUjda2IUFtqEqWDPuA3JXYIBLgU+XCOjBS/9sCQqp6FV2M/MJ4Lo8HecmbCwO:8bQ5Z1tbDPbaQLyl0uPqp6iM/8Oy131
Static task
static1
Behavioral task
behavioral1
Sample
dfea0b49c1cfa9fbd0aa168fe740a70d6eab0c40e544e9b105ce8fb3eed795e1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dfea0b49c1cfa9fbd0aa168fe740a70d6eab0c40e544e9b105ce8fb3eed795e1.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
dfea0b49c1cfa9fbd0aa168fe740a70d6eab0c40e544e9b105ce8fb3eed795e1
-
Size
206KB
-
MD5
024f08de698b6b7e784214f4fcaa05a4
-
SHA1
e2ba2fc3ef2b8b97a7ed500633cda58fdd652a93
-
SHA256
dfea0b49c1cfa9fbd0aa168fe740a70d6eab0c40e544e9b105ce8fb3eed795e1
-
SHA512
b94e940653076d29c780c2ecb4f4910737404f9f8861b14b254f06069616962f12c7976bcc8bc30f7a04596432988c6db2ac949011e7d92414e2e7672b2c3084
-
SSDEEP
3072:7YbzUjda2IUFtqEqWDPuA3JXYIBLgU+XCOjBS/9sCQqp6FV2M/MJ4Lo8HecmbCwO:8bQ5Z1tbDPbaQLyl0uPqp6iM/8Oy131
Score10/10-
Modifies firewall policy service
-
Modifies security service
-
Executes dropped EXE
-
Registers COM server for autorun
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Suspicious use of SetThreadContext
-