General
-
Target
4708bac148c1354efa086007eb4c5652851ad63f4490cb659b999957984925e9
-
Size
292KB
-
Sample
221027-f8d9saahhr
-
MD5
0bb8cd8c15d83ecf1691797cec23e5f0
-
SHA1
3166b77481b08d270bd8cb1c432bd67398f8a1e2
-
SHA256
4708bac148c1354efa086007eb4c5652851ad63f4490cb659b999957984925e9
-
SHA512
d7651e3d585e3c4766682576b7ee89c81a29f9e0adaa1aa97af9b1a7e778b629812d84a8ce2793f4d8622d1f728dcf505e65c55e63f514f9e395ff695f483e0b
-
SSDEEP
6144:RyBK8GMRovbL43fPf6jXdmFDYoCCcUrHX4OKCwEo6v:UDTovP43nfemFWUrHX4OXwd6v
Static task
static1
Behavioral task
behavioral1
Sample
4708bac148c1354efa086007eb4c5652851ad63f4490cb659b999957984925e9.exe
Resource
win7-20220812-en
Malware Config
Extracted
ramnit
��1
malesaqua.eu:442
-
campaign_timestamp
1.506273416e+09
-
compile_timestamp
1.505999145e+09
-
dga_seed
4.13789472e+09
-
listen_port
0
-
num_dga_domains
100
Extracted
ramnit
28
malesaqua.eu:442
-
campaign_timestamp
1.506273416e+09
-
compile_timestamp
1.505999145e+09
-
dga_seed
4.13789472e+09
-
listen_port
0
-
num_dga_domains
100
Targets
-
-
Target
4708bac148c1354efa086007eb4c5652851ad63f4490cb659b999957984925e9
-
Size
292KB
-
MD5
0bb8cd8c15d83ecf1691797cec23e5f0
-
SHA1
3166b77481b08d270bd8cb1c432bd67398f8a1e2
-
SHA256
4708bac148c1354efa086007eb4c5652851ad63f4490cb659b999957984925e9
-
SHA512
d7651e3d585e3c4766682576b7ee89c81a29f9e0adaa1aa97af9b1a7e778b629812d84a8ce2793f4d8622d1f728dcf505e65c55e63f514f9e395ff695f483e0b
-
SSDEEP
6144:RyBK8GMRovbL43fPf6jXdmFDYoCCcUrHX4OKCwEo6v:UDTovP43nfemFWUrHX4OXwd6v
-
Deletes itself
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-