General
-
Target
242b5a2a411b654389034e96e0907a7e6a531eb2d1c3a711561c3a51b86945ba
-
Size
598KB
-
Sample
221126-2pr77aec8x
-
MD5
fed712f05608691dbdfd0a693fb45e4d
-
SHA1
420b2b69b05f387326e456020d43b3efa38e1e97
-
SHA256
242b5a2a411b654389034e96e0907a7e6a531eb2d1c3a711561c3a51b86945ba
-
SHA512
8b2adb6d4ef9f939782edf82c313714a51c64652fa7c03d0392d89cea1ce973a8d5451e62c37bad3b6403434cee853254f48d69317591da0a031526db7000e7a
-
SSDEEP
6144:Tf3nSK1ae5HXQPFfH7d97qPU2sXUtnEPXs8SrTiJHltUnV6F/Q649nv9Eymunv+k:TfCK1aSiFesN6iV7VQ6iiMmt+1hZjV9
Static task
static1
Behavioral task
behavioral1
Sample
242b5a2a411b654389034e96e0907a7e6a531eb2d1c3a711561c3a51b86945ba.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
242b5a2a411b654389034e96e0907a7e6a531eb2d1c3a711561c3a51b86945ba.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
242b5a2a411b654389034e96e0907a7e6a531eb2d1c3a711561c3a51b86945ba
-
Size
598KB
-
MD5
fed712f05608691dbdfd0a693fb45e4d
-
SHA1
420b2b69b05f387326e456020d43b3efa38e1e97
-
SHA256
242b5a2a411b654389034e96e0907a7e6a531eb2d1c3a711561c3a51b86945ba
-
SHA512
8b2adb6d4ef9f939782edf82c313714a51c64652fa7c03d0392d89cea1ce973a8d5451e62c37bad3b6403434cee853254f48d69317591da0a031526db7000e7a
-
SSDEEP
6144:Tf3nSK1ae5HXQPFfH7d97qPU2sXUtnEPXs8SrTiJHltUnV6F/Q649nv9Eymunv+k:TfCK1aSiFesN6iV7VQ6iiMmt+1hZjV9
Score9/10-
Checks for common network interception software
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Enumerates VirtualBox registry keys
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-