General
-
Target
3bb7488b024edf7e43077d5cb0fd0a54383a1edcbe0a87b9179d07be43d5db74
-
Size
173KB
-
Sample
221123-2rv2vsdg2y
-
MD5
5e49c21ee04cbcb3b1b3b1cff0e947eb
-
SHA1
49f617d79ebbde8adcbab5ad9216ee2c41fe5e66
-
SHA256
3bb7488b024edf7e43077d5cb0fd0a54383a1edcbe0a87b9179d07be43d5db74
-
SHA512
8071416fc2594f4a996cef0038613f5da83e96eecec95ff336b6df3857cde389112545e262b97683799b0c500ac3484b61cad0e67619bb6a518311472e52d71e
-
SSDEEP
3072:wCx/G2TajiYb47TapvObqHgrJjgz3iN/lDnuWNVoarljuPzYoTP3VlVAAV8:w4/G14XaaqEdgbiNp/LoaJjwYozllVV
Static task
static1
Behavioral task
behavioral1
Sample
3bb7488b024edf7e43077d5cb0fd0a54383a1edcbe0a87b9179d07be43d5db74.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3bb7488b024edf7e43077d5cb0fd0a54383a1edcbe0a87b9179d07be43d5db74.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
3bb7488b024edf7e43077d5cb0fd0a54383a1edcbe0a87b9179d07be43d5db74
-
Size
173KB
-
MD5
5e49c21ee04cbcb3b1b3b1cff0e947eb
-
SHA1
49f617d79ebbde8adcbab5ad9216ee2c41fe5e66
-
SHA256
3bb7488b024edf7e43077d5cb0fd0a54383a1edcbe0a87b9179d07be43d5db74
-
SHA512
8071416fc2594f4a996cef0038613f5da83e96eecec95ff336b6df3857cde389112545e262b97683799b0c500ac3484b61cad0e67619bb6a518311472e52d71e
-
SSDEEP
3072:wCx/G2TajiYb47TapvObqHgrJjgz3iN/lDnuWNVoarljuPzYoTP3VlVAAV8:w4/G14XaaqEdgbiNp/LoaJjwYozllVV
Score8/10-
Executes dropped EXE
-
Registers COM server for autorun
-
Deletes itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-