General
-
Target
93e2026b63542ec626cb28fb362d37bc9f3e417af46598c10544825b48da569e
-
Size
174KB
-
Sample
221106-jy8bnadeej
-
MD5
31198e14dd25c3fbd14b143ea5c42bfc
-
SHA1
de1314ece298e35db29fbd51bcaa98c3702e865d
-
SHA256
93e2026b63542ec626cb28fb362d37bc9f3e417af46598c10544825b48da569e
-
SHA512
347709682bf365f21bf23bc80d2c0c734f580ae6632630209f0fc492bc6ffc25e06ec13fce2fabd57f77aa8fef176988d18f2e9d0562dbe9a2fa5b18a2c076fc
-
SSDEEP
3072:By2ZFOxK/8uV0Vgygkfrckq1fWpUp9Kpq43nSZ:3ExyHV0z1frcTepZqE
Static task
static1
Behavioral task
behavioral1
Sample
93e2026b63542ec626cb28fb362d37bc9f3e417af46598c10544825b48da569e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
93e2026b63542ec626cb28fb362d37bc9f3e417af46598c10544825b48da569e.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
93e2026b63542ec626cb28fb362d37bc9f3e417af46598c10544825b48da569e
-
Size
174KB
-
MD5
31198e14dd25c3fbd14b143ea5c42bfc
-
SHA1
de1314ece298e35db29fbd51bcaa98c3702e865d
-
SHA256
93e2026b63542ec626cb28fb362d37bc9f3e417af46598c10544825b48da569e
-
SHA512
347709682bf365f21bf23bc80d2c0c734f580ae6632630209f0fc492bc6ffc25e06ec13fce2fabd57f77aa8fef176988d18f2e9d0562dbe9a2fa5b18a2c076fc
-
SSDEEP
3072:By2ZFOxK/8uV0Vgygkfrckq1fWpUp9Kpq43nSZ:3ExyHV0z1frcTepZqE
Score8/10-
Executes dropped EXE
-
Registers COM server for autorun
-
Deletes itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Suspicious use of SetThreadContext
-