General
-
Target
59b738333eeb7ee6900f6cf00455915499c99612b9e4dc45243034dca860e18a
-
Size
174KB
-
Sample
221106-krh9maced6
-
MD5
12046ca6cceb55637a8fbbcff42d1b37
-
SHA1
9362b599f6356a41ac4c2db5e148f7e4eb6834f2
-
SHA256
59b738333eeb7ee6900f6cf00455915499c99612b9e4dc45243034dca860e18a
-
SHA512
062018b5504261d2d92822203bf3a569732ea27afbeee9eb2ae12893609ff2c74e8c56d9e990023612ddf3b4284d028d51dd172a5aea2bcd04d0ba21ee604908
-
SSDEEP
3072:C4+qazb2+jZTy49OEUImVIW3g8F7oWt69viNKkoARGz1H1K/G1g8MOQl0XxThtOM:b+/qwTy49O9eug82SeZkoAROHg8jy0X/
Static task
static1
Behavioral task
behavioral1
Sample
59b738333eeb7ee6900f6cf00455915499c99612b9e4dc45243034dca860e18a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
59b738333eeb7ee6900f6cf00455915499c99612b9e4dc45243034dca860e18a.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
59b738333eeb7ee6900f6cf00455915499c99612b9e4dc45243034dca860e18a
-
Size
174KB
-
MD5
12046ca6cceb55637a8fbbcff42d1b37
-
SHA1
9362b599f6356a41ac4c2db5e148f7e4eb6834f2
-
SHA256
59b738333eeb7ee6900f6cf00455915499c99612b9e4dc45243034dca860e18a
-
SHA512
062018b5504261d2d92822203bf3a569732ea27afbeee9eb2ae12893609ff2c74e8c56d9e990023612ddf3b4284d028d51dd172a5aea2bcd04d0ba21ee604908
-
SSDEEP
3072:C4+qazb2+jZTy49OEUImVIW3g8F7oWt69viNKkoARGz1H1K/G1g8MOQl0XxThtOM:b+/qwTy49O9eug82SeZkoAROHg8jy0X/
Score8/10-
Executes dropped EXE
-
Registers COM server for autorun
-
Deletes itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-