General
-
Target
67f40ca0622787cb30e0bbb50618e2f752dbb216d0cf8671e4409b6bdc8e4cdc
-
Size
38KB
-
Sample
221029-2g2rnahhg3
-
MD5
5c8859d84a52976788d4166615e1cb68
-
SHA1
a2cd94db18d56e2813c630c8890a4cc1c1a3a210
-
SHA256
67f40ca0622787cb30e0bbb50618e2f752dbb216d0cf8671e4409b6bdc8e4cdc
-
SHA512
c13853e1dd101ff8ad7ae00e2d20343655ac5988194bf88e6cfc4ac4f6f15b75319aad8ae603a69be86f093a85197287e6b6a6d539bb92fc03b518ec0c928e6d
-
SSDEEP
768:cD8Mku/08vChRzSbJ/iB1ljyRFQPeB1Qi6YyJVQQeDlV8T3+cxcGI:ABkuM1hR2g18CeB1QMyJVQQeD4vxcGI
Static task
static1
Behavioral task
behavioral1
Sample
67f40ca0622787cb30e0bbb50618e2f752dbb216d0cf8671e4409b6bdc8e4cdc.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
67f40ca0622787cb30e0bbb50618e2f752dbb216d0cf8671e4409b6bdc8e4cdc.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
67f40ca0622787cb30e0bbb50618e2f752dbb216d0cf8671e4409b6bdc8e4cdc
-
Size
38KB
-
MD5
5c8859d84a52976788d4166615e1cb68
-
SHA1
a2cd94db18d56e2813c630c8890a4cc1c1a3a210
-
SHA256
67f40ca0622787cb30e0bbb50618e2f752dbb216d0cf8671e4409b6bdc8e4cdc
-
SHA512
c13853e1dd101ff8ad7ae00e2d20343655ac5988194bf88e6cfc4ac4f6f15b75319aad8ae603a69be86f093a85197287e6b6a6d539bb92fc03b518ec0c928e6d
-
SSDEEP
768:cD8Mku/08vChRzSbJ/iB1ljyRFQPeB1Qi6YyJVQQeDlV8T3+cxcGI:ABkuM1hR2g18CeB1QMyJVQQeD4vxcGI
Score8/10-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Suspicious use of SetThreadContext
-