General
-
Target
394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207
-
Size
183KB
-
Sample
221123-rxjkxacf8z
-
MD5
cae5375edf4df5c7e703de7466194367
-
SHA1
a6f60837bf37c64800d7333695cc63b9aad2a967
-
SHA256
394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207
-
SHA512
7d083bb26c378a58aca53ae14da5a966b459c0ea7e16fcece3de5f14c68edf95132d7cc754eda550dbf074dbc5209af5616b1e7aeff640be62d09d4c01ff4745
-
SSDEEP
3072:KBPUQsZZQvSq8QM6L8QZ6UV8Q+UZOi9CDDwTgVEZM1n87fhzGlu4I:wxsZL7QM6L8QZ668cZOi4wi9afw
Static task
static1
Behavioral task
behavioral1
Sample
394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207
-
Size
183KB
-
MD5
cae5375edf4df5c7e703de7466194367
-
SHA1
a6f60837bf37c64800d7333695cc63b9aad2a967
-
SHA256
394a34bc57fa33949ba76ae7f6df20286a5593f6e7e8e850da34b0b7328d3207
-
SHA512
7d083bb26c378a58aca53ae14da5a966b459c0ea7e16fcece3de5f14c68edf95132d7cc754eda550dbf074dbc5209af5616b1e7aeff640be62d09d4c01ff4745
-
SSDEEP
3072:KBPUQsZZQvSq8QM6L8QZ6UV8Q+UZOi9CDDwTgVEZM1n87fhzGlu4I:wxsZL7QM6L8QZ668cZOi4wi9afw
Score8/10-
Registers COM server for autorun
-
Deletes itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Suspicious use of SetThreadContext
-