General
-
Target
78d8be0c162fc2ef33a4357a3a1ac82d42e773c8f87406d2e678dcefa80b4575
-
Size
1.5MB
-
Sample
221125-tbjd5ahd94
-
MD5
448aba4a116723c528154cdd23545490
-
SHA1
04bb39f49e80ae8b23603df44a0b7f857bac9f44
-
SHA256
78d8be0c162fc2ef33a4357a3a1ac82d42e773c8f87406d2e678dcefa80b4575
-
SHA512
1055fed4a85dff3aeb0d88322164680355af8f6e72ec44fc1c07e0310c82d14dd90ac376f1a0d416e1e11482aa1198148b5d2e6a73b8b6a344f3db053a65140f
-
SSDEEP
24576:aqtusu+tVxHPidqUAIM3CNQgII6SZlCDHh3R5ZdBAq8yN8tMG6:aZwd4MbyZlUBB5xAql
Static task
static1
Behavioral task
behavioral1
Sample
78d8be0c162fc2ef33a4357a3a1ac82d42e773c8f87406d2e678dcefa80b4575.exe
Resource
win7-20220901-en
Malware Config
Extracted
bandook
sandykarakas.ddns.net
Targets
-
-
Target
78d8be0c162fc2ef33a4357a3a1ac82d42e773c8f87406d2e678dcefa80b4575
-
Size
1.5MB
-
MD5
448aba4a116723c528154cdd23545490
-
SHA1
04bb39f49e80ae8b23603df44a0b7f857bac9f44
-
SHA256
78d8be0c162fc2ef33a4357a3a1ac82d42e773c8f87406d2e678dcefa80b4575
-
SHA512
1055fed4a85dff3aeb0d88322164680355af8f6e72ec44fc1c07e0310c82d14dd90ac376f1a0d416e1e11482aa1198148b5d2e6a73b8b6a344f3db053a65140f
-
SSDEEP
24576:aqtusu+tVxHPidqUAIM3CNQgII6SZlCDHh3R5ZdBAq8yN8tMG6:aZwd4MbyZlUBB5xAql
Score10/10-
Bandook payload
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-