General
-
Target
6c6528eeb384187114d04f393d9756a357070b5974de42ab46a60c30b3bfb65b
-
Size
308KB
-
Sample
221029-awszhsdfh4
-
MD5
0c2a1766abf78ca0185ccdf3c95fd762
-
SHA1
5d5a058df1a326dabfd15b6d6966a607c840aa2d
-
SHA256
6c6528eeb384187114d04f393d9756a357070b5974de42ab46a60c30b3bfb65b
-
SHA512
e303a74b0f68a2740b8e861990e8157f35af20bf2000e1085716704ab4b3e855ace0bb339838a06bd82b7897c7f74fd555df2260854bdefaf43ea5241fc9c0b4
-
SSDEEP
6144:fWs8Q7HJkxrWTS9SgRxkWiZHqB46OuGnyEf:18QzJlSI0xdiFqBNGf
Static task
static1
Behavioral task
behavioral1
Sample
6c6528eeb384187114d04f393d9756a357070b5974de42ab46a60c30b3bfb65b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6c6528eeb384187114d04f393d9756a357070b5974de42ab46a60c30b3bfb65b.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
6c6528eeb384187114d04f393d9756a357070b5974de42ab46a60c30b3bfb65b
-
Size
308KB
-
MD5
0c2a1766abf78ca0185ccdf3c95fd762
-
SHA1
5d5a058df1a326dabfd15b6d6966a607c840aa2d
-
SHA256
6c6528eeb384187114d04f393d9756a357070b5974de42ab46a60c30b3bfb65b
-
SHA512
e303a74b0f68a2740b8e861990e8157f35af20bf2000e1085716704ab4b3e855ace0bb339838a06bd82b7897c7f74fd555df2260854bdefaf43ea5241fc9c0b4
-
SSDEEP
6144:fWs8Q7HJkxrWTS9SgRxkWiZHqB46OuGnyEf:18QzJlSI0xdiFqBNGf
Score10/10-
Modifies security service
-
Executes dropped EXE
-
Registers COM server for autorun
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Suspicious use of SetThreadContext
-