General
-
Target
8226376423.zip
-
Size
10KB
-
Sample
221018-1ff8wsedem
-
MD5
ab7b6d32811f7548a277cd3afd1293af
-
SHA1
6861e2256ddd14a7fa14fb71c70c43f6fbce0d73
-
SHA256
0710eabb964125f65e2ea8587585b1883ce98641ce4da8db46eddc404f8cfa6c
-
SHA512
6ec9d5427dd7f610b7135bd994ead21a132ef6519f675ec55c5102b6e4ccae99a3d54a824abd21426c36944b8b81a286fb50bbc3701d6f4766acfa7776e8cd8a
-
SSDEEP
192:BOQ6CnrDmi1JGC5weZHPBHZ0n/1jhAABGsXneVbZYDIFzxbezus0V:08nPFJGCzHPlZQ3YsXexZIIFzxbezus2
Static task
static1
Behavioral task
behavioral1
Sample
0db4df6533bbe4f721a016b59e89c0ed2ab9af0dec7a8200f7f0e83617bf3d9f.iso
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0db4df6533bbe4f721a016b59e89c0ed2ab9af0dec7a8200f7f0e83617bf3d9f.iso
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
RECHNUNG.chm
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
RECHNUNG.chm
Resource
win10v2004-20220812-en
Malware Config
Extracted
https://meyeks.com.tr/hala.txt
Targets
-
-
Target
0db4df6533bbe4f721a016b59e89c0ed2ab9af0dec7a8200f7f0e83617bf3d9f
-
Size
1.2MB
-
MD5
07f94938347091978c25af1a7f42f72f
-
SHA1
5260230f225ca88e903357e72b2a6e2b2007162d
-
SHA256
0db4df6533bbe4f721a016b59e89c0ed2ab9af0dec7a8200f7f0e83617bf3d9f
-
SHA512
11b17e7474dee868276520be680616b7a3433016dda071d26e65d82b0eab0179e755d91bcaf060a6c5047ff429f159fd4351ffae7c9f5a1cb952990de07fd628
-
SSDEEP
192:NtOIXco/1QY0OXlb3iQbZaEaJT5cC+aRWTwY2TZhYj1HhIUb:Vcodln53HZ/aLWa0MY21YIc
Score3/10 -
-
-
Target
RECHNUNG.CHM
-
Size
14KB
-
MD5
498b61349a8668cae80d468b348abb9d
-
SHA1
603d0fdba865ad02eef0c96462be6d97d431e7ac
-
SHA256
e268f2982e14d363e7f7874696d231701234d4b426c3a1bef7271cc0bf766706
-
SHA512
e4281b3210518e2ea965e5d63a070f2eec89ea1d37b9c0d9d65023ec457570b30ab4092e888e75f53797a33143e5bbcdf8ec2845d3176f8bfae02674e126665f
-
SSDEEP
192:Nco/1QY0OXlb3iQbZaEaJT5cC+aRWTwY2TZhYj1HhIUb:Ncodln53HZ/aLWa0MY21YIc
Score10/10-
Blocklisted process makes network request
-