General
-
Target
bG4j.exe
-
Size
47KB
-
Sample
221101-yx3gcafeeq
-
MD5
8a4aa99015bb56de6b952c8440e9d3ed
-
SHA1
d725448c788033c5fe1f16f22b22f0466f154dd1
-
SHA256
f0430f99dbe7274af48f2761c6246b89c59a6ccb139b271fa1c02cecf7b8d5bb
-
SHA512
3a27fc83c6e0784593095d3cec06ba3250794b6bf03fb19c384fc8351ee28f8496761572ecd9417d6fed7d9f8e91cf286bec3fbb13ecf13495f7ff27644571b3
-
SSDEEP
768:p96mxUTILWCaS+DiMtelDSN+iV08YbygeTu89XvEgK/JnZVc6KN:p96AKWMtKDs4zb1989XnkJnZVclN
Behavioral task
behavioral1
Sample
bG4j.exe
Resource
win7-20220812-en
Malware Config
Targets
-
-
Target
bG4j.exe
-
Size
47KB
-
MD5
8a4aa99015bb56de6b952c8440e9d3ed
-
SHA1
d725448c788033c5fe1f16f22b22f0466f154dd1
-
SHA256
f0430f99dbe7274af48f2761c6246b89c59a6ccb139b271fa1c02cecf7b8d5bb
-
SHA512
3a27fc83c6e0784593095d3cec06ba3250794b6bf03fb19c384fc8351ee28f8496761572ecd9417d6fed7d9f8e91cf286bec3fbb13ecf13495f7ff27644571b3
-
SSDEEP
768:p96mxUTILWCaS+DiMtelDSN+iV08YbygeTu89XvEgK/JnZVc6KN:p96AKWMtKDs4zb1989XnkJnZVclN
-
Async RAT payload
-
Legitimate hosting services abused for malware hosting/C2
-