General
-
Target
49be22222c4a90a165848ab0da5963d19f3890d035dd2f09f556b62c88641408
-
Size
37KB
-
Sample
221003-pacsqsege7
-
MD5
655b6d547342a221ad72dbc2f37a5f67
-
SHA1
047542028e5babbd74005d356ab1730502f1cb55
-
SHA256
49be22222c4a90a165848ab0da5963d19f3890d035dd2f09f556b62c88641408
-
SHA512
ee58eead75a80fd1655cf40f6b8ed55ca3fd98f9e08f2bb706c5914a6b1a61ba3673e3c4ac77c2bf06e18297515f2c1819ce20fbfbbabfbe34cd6cb462df9207
-
SSDEEP
768:jpuxbbb93pfzxWt7QYQ8IgDidhHPjAJYvHF0lwY437avXKrnrV:j0Rbb5WRQYt9ir/2wram
Static task
static1
Behavioral task
behavioral1
Sample
49be22222c4a90a165848ab0da5963d19f3890d035dd2f09f556b62c88641408.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
49be22222c4a90a165848ab0da5963d19f3890d035dd2f09f556b62c88641408.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
49be22222c4a90a165848ab0da5963d19f3890d035dd2f09f556b62c88641408
-
Size
37KB
-
MD5
655b6d547342a221ad72dbc2f37a5f67
-
SHA1
047542028e5babbd74005d356ab1730502f1cb55
-
SHA256
49be22222c4a90a165848ab0da5963d19f3890d035dd2f09f556b62c88641408
-
SHA512
ee58eead75a80fd1655cf40f6b8ed55ca3fd98f9e08f2bb706c5914a6b1a61ba3673e3c4ac77c2bf06e18297515f2c1819ce20fbfbbabfbe34cd6cb462df9207
-
SSDEEP
768:jpuxbbb93pfzxWt7QYQ8IgDidhHPjAJYvHF0lwY437avXKrnrV:j0Rbb5WRQYt9ir/2wram
Score8/10-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Suspicious use of SetThreadContext
-