General
-
Target
c32ad88c30f55ff20888c5eeb8e3b1bb14e0b467dfbfae0fd7238c1fe624c15d
-
Size
185KB
-
Sample
221029-ae7rcadaa2
-
MD5
00544f26c5bf273ac8e11f4b934f56a1
-
SHA1
892aff3dbb82e60c41082ae654f46c2355e9af77
-
SHA256
c32ad88c30f55ff20888c5eeb8e3b1bb14e0b467dfbfae0fd7238c1fe624c15d
-
SHA512
5467fb48734ac1ccfd947c058a8a7b050b144944b985bcc9e99500060bef0072eb5809991e73a177f3261829200142fc31ac79717c1fc4ad444c013faee2e42f
-
SSDEEP
3072:bjPYGIKu52wKuBw+kMiwmxQE3RkV/JdO1D4sbeSUOnHr:biD4wa+kMiyJkD4DS5H
Static task
static1
Behavioral task
behavioral1
Sample
c32ad88c30f55ff20888c5eeb8e3b1bb14e0b467dfbfae0fd7238c1fe624c15d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c32ad88c30f55ff20888c5eeb8e3b1bb14e0b467dfbfae0fd7238c1fe624c15d.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
c32ad88c30f55ff20888c5eeb8e3b1bb14e0b467dfbfae0fd7238c1fe624c15d
-
Size
185KB
-
MD5
00544f26c5bf273ac8e11f4b934f56a1
-
SHA1
892aff3dbb82e60c41082ae654f46c2355e9af77
-
SHA256
c32ad88c30f55ff20888c5eeb8e3b1bb14e0b467dfbfae0fd7238c1fe624c15d
-
SHA512
5467fb48734ac1ccfd947c058a8a7b050b144944b985bcc9e99500060bef0072eb5809991e73a177f3261829200142fc31ac79717c1fc4ad444c013faee2e42f
-
SSDEEP
3072:bjPYGIKu52wKuBw+kMiwmxQE3RkV/JdO1D4sbeSUOnHr:biD4wa+kMiyJkD4DS5H
Score8/10-
Executes dropped EXE
-
Registers COM server for autorun
-
Deletes itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-