General
-
Target
e28caf89ff2f2d6579f7e49bf4e69bb2b07e3d0a0c8ae39f875c3d309b915e4b
-
Size
222KB
-
Sample
221123-p4cd3aga3s
-
MD5
c787afed386c51d58fc01c9931d806ec
-
SHA1
626472a865ff8c01235bc4ac9f810857dea39811
-
SHA256
e28caf89ff2f2d6579f7e49bf4e69bb2b07e3d0a0c8ae39f875c3d309b915e4b
-
SHA512
2693186f08825427e9ecbfc8cb36c255b23e714b1a44d86e7428d5377a8ddbeaeedb81b16ae2196952846b1f88e6f1b98cd769ba23737edd0f24fbe000c597ac
-
SSDEEP
3072:ByznQkl1GQxdvoBy8oPCvDh+0OyneN3AIdj5W9lrgYumqi/mPPwaBbb:G1lf8oPCvDI0i3AIdj5G8YuxPP1
Static task
static1
Behavioral task
behavioral1
Sample
e28caf89ff2f2d6579f7e49bf4e69bb2b07e3d0a0c8ae39f875c3d309b915e4b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e28caf89ff2f2d6579f7e49bf4e69bb2b07e3d0a0c8ae39f875c3d309b915e4b.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
e28caf89ff2f2d6579f7e49bf4e69bb2b07e3d0a0c8ae39f875c3d309b915e4b
-
Size
222KB
-
MD5
c787afed386c51d58fc01c9931d806ec
-
SHA1
626472a865ff8c01235bc4ac9f810857dea39811
-
SHA256
e28caf89ff2f2d6579f7e49bf4e69bb2b07e3d0a0c8ae39f875c3d309b915e4b
-
SHA512
2693186f08825427e9ecbfc8cb36c255b23e714b1a44d86e7428d5377a8ddbeaeedb81b16ae2196952846b1f88e6f1b98cd769ba23737edd0f24fbe000c597ac
-
SSDEEP
3072:ByznQkl1GQxdvoBy8oPCvDh+0OyneN3AIdj5W9lrgYumqi/mPPwaBbb:G1lf8oPCvDI0i3AIdj5G8YuxPP1
Score8/10-
Executes dropped EXE
-
Registers COM server for autorun
-
Deletes itself
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-