General
-
Target
32faa6dd8ce43d80a00e420b083f1084d705fbc022ae87979c5ad73949df4b79
-
Size
224KB
-
Sample
221123-rzzd5sch5z
-
MD5
f8618ef11432e37cc9954515a98b40c7
-
SHA1
713d6f84ddaa638bb72b844bd375205e75ffe436
-
SHA256
32faa6dd8ce43d80a00e420b083f1084d705fbc022ae87979c5ad73949df4b79
-
SHA512
3b63bdf903eac5b4e3d6610c978c9201198e33f5e7d7141ac1c657ab4d60a304461ffb0a75d8a147e3dc779d696d8807aa5acd792d8446b869c174fb6a3c5c69
-
SSDEEP
6144:yNBl76cpETWpZxcsvaSzjsQLSp0Dk7QHmvgKQ:6l76cMKYsvaS4R7xVQ
Static task
static1
Behavioral task
behavioral1
Sample
32faa6dd8ce43d80a00e420b083f1084d705fbc022ae87979c5ad73949df4b79.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
32faa6dd8ce43d80a00e420b083f1084d705fbc022ae87979c5ad73949df4b79.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
32faa6dd8ce43d80a00e420b083f1084d705fbc022ae87979c5ad73949df4b79
-
Size
224KB
-
MD5
f8618ef11432e37cc9954515a98b40c7
-
SHA1
713d6f84ddaa638bb72b844bd375205e75ffe436
-
SHA256
32faa6dd8ce43d80a00e420b083f1084d705fbc022ae87979c5ad73949df4b79
-
SHA512
3b63bdf903eac5b4e3d6610c978c9201198e33f5e7d7141ac1c657ab4d60a304461ffb0a75d8a147e3dc779d696d8807aa5acd792d8446b869c174fb6a3c5c69
-
SSDEEP
6144:yNBl76cpETWpZxcsvaSzjsQLSp0Dk7QHmvgKQ:6l76cMKYsvaS4R7xVQ
Score8/10-
Executes dropped EXE
-
Deletes itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-