General
-
Target
dccce74d3584586f2f2318c49bd78fa1412b4bea80dc81cf52a79f45d90c8d60
-
Size
512KB
-
Sample
221011-v5w3raffh5
-
MD5
2e45e50d3b1e2b84518b223afa535d00
-
SHA1
776c7b02bb3dff3cc03c15598ab0d25fe5edf2be
-
SHA256
dccce74d3584586f2f2318c49bd78fa1412b4bea80dc81cf52a79f45d90c8d60
-
SHA512
a299db84176a46aa4b85e1dc97793a5bcf6fb80fe6a0937e7bd9c979daf758ec98ba83cc0c1eec82fce79bdc9188566f42dac0da5dffd5c7a0eb9fdbfee81b15
-
SSDEEP
12288:i1Ul4V1CoZ0n1Ul4c1Ul4O1Ul4V1CoZ0t:i2lYLZ0n2ld2lf2lYLZ0t
Static task
static1
Behavioral task
behavioral1
Sample
dccce74d3584586f2f2318c49bd78fa1412b4bea80dc81cf52a79f45d90c8d60.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dccce74d3584586f2f2318c49bd78fa1412b4bea80dc81cf52a79f45d90c8d60.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
dccce74d3584586f2f2318c49bd78fa1412b4bea80dc81cf52a79f45d90c8d60
-
Size
512KB
-
MD5
2e45e50d3b1e2b84518b223afa535d00
-
SHA1
776c7b02bb3dff3cc03c15598ab0d25fe5edf2be
-
SHA256
dccce74d3584586f2f2318c49bd78fa1412b4bea80dc81cf52a79f45d90c8d60
-
SHA512
a299db84176a46aa4b85e1dc97793a5bcf6fb80fe6a0937e7bd9c979daf758ec98ba83cc0c1eec82fce79bdc9188566f42dac0da5dffd5c7a0eb9fdbfee81b15
-
SSDEEP
12288:i1Ul4V1CoZ0n1Ul4c1Ul4O1Ul4V1CoZ0t:i2lYLZ0n2ld2lf2lYLZ0t
Score8/10-
Executes dropped EXE
-
Registers COM server for autorun
-
Deletes itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-