General
-
Target
8295042594.zip
-
Size
1.8MB
-
Sample
221104-xrsvaaabc8
-
MD5
fff453c66a67f6b348aa170b55a0dba4
-
SHA1
36dd470bb60fc04f6d7d87a5ed4183bce68ab1e8
-
SHA256
cd071b60449984568f35670bcb89e4988f6532be7e6087c9ce7021bc0cc49a56
-
SHA512
eba28dc12071a339abd5e483d0101a8bc9b4266200bf767ee0c0984baa10ca988e965e5e87781434a14d4d1eeb5870f89d2498a541faeda3d521cdcf8c545d41
-
SSDEEP
24576:ljezx1OYvtA83GBsP6cKh38Sr0mtD03HOSrSG8IYg/8KID7Y+HaPUxENnhegiI78:Qt1O0isPVg3P03lfIDMxhYMGSg
Static task
static1
Behavioral task
behavioral1
Sample
8295042594.zip
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8295042594.zip
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
099afcdcf586e43f851a0a63d12328f5a44884a711c61c8679a693bd239d51b1.exe
Resource
win7-20220812-en
Malware Config
Extracted
bitrat
1.38
bitrat6060.duckdns.org:6060
-
communication_password
e10adc3949ba59abbe56e057f20f883e
-
tor_process
tor
Targets
-
-
Target
8295042594.zip
-
Size
1.8MB
-
MD5
fff453c66a67f6b348aa170b55a0dba4
-
SHA1
36dd470bb60fc04f6d7d87a5ed4183bce68ab1e8
-
SHA256
cd071b60449984568f35670bcb89e4988f6532be7e6087c9ce7021bc0cc49a56
-
SHA512
eba28dc12071a339abd5e483d0101a8bc9b4266200bf767ee0c0984baa10ca988e965e5e87781434a14d4d1eeb5870f89d2498a541faeda3d521cdcf8c545d41
-
SSDEEP
24576:ljezx1OYvtA83GBsP6cKh38Sr0mtD03HOSrSG8IYg/8KID7Y+HaPUxENnhegiI78:Qt1O0isPVg3P03lfIDMxhYMGSg
Score1/10 -
-
-
Target
099afcdcf586e43f851a0a63d12328f5a44884a711c61c8679a693bd239d51b1
-
Size
300.0MB
-
MD5
1420cfc2bea47d52a937fbea0415baa8
-
SHA1
8d4ea7755d633dc9cd2f721d951fc17bdf5346d6
-
SHA256
099afcdcf586e43f851a0a63d12328f5a44884a711c61c8679a693bd239d51b1
-
SHA512
3546d9569ea5f6d891c42e5e805041fc288fcd78943dee2eef251cd52de1910213cfbe2d71e7386fa3d40d5a27ac3de39293e4e05487113b7cbd32c2dd3bb0c7
-
SSDEEP
24576:C5gfuhMt53oiTyVl7gyCPUmj15wlutqzKn4QpeuCdEz9aJ3bxKui0HpzYU0:C5+IUbGcq0hz9o3bkj2U
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-