General
-
Target
215e37b2c56e74858f610aa6625c64f1b99f9e05f3261d2b4196b0246611a8c6
-
Size
147KB
-
Sample
221127-tpmzgaah63
-
MD5
cb2d6ea208bbd1e42fb69ceb461d2f72
-
SHA1
a88ca24aeef56d692feff6fe0f0ac9df09a82796
-
SHA256
215e37b2c56e74858f610aa6625c64f1b99f9e05f3261d2b4196b0246611a8c6
-
SHA512
e8a5be38e7f06b751068b3d43e56fe8a82d73c796e8f8044498878e1bd8cc7b0d497e34f81b74c753235e7af4a6a196981c515a4778fc7cc8a62ca7505fa3301
-
SSDEEP
3072:FaJvDmCOU4piJA7vrOaUNC3Hjljb7K/w/qKewWZIiB64d5vPtjnXuG:FaJvqvU4lrOR83U/wCwWqild5vPl
Static task
static1
Behavioral task
behavioral1
Sample
215e37b2c56e74858f610aa6625c64f1b99f9e05f3261d2b4196b0246611a8c6.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
215e37b2c56e74858f610aa6625c64f1b99f9e05f3261d2b4196b0246611a8c6.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
215e37b2c56e74858f610aa6625c64f1b99f9e05f3261d2b4196b0246611a8c6
-
Size
147KB
-
MD5
cb2d6ea208bbd1e42fb69ceb461d2f72
-
SHA1
a88ca24aeef56d692feff6fe0f0ac9df09a82796
-
SHA256
215e37b2c56e74858f610aa6625c64f1b99f9e05f3261d2b4196b0246611a8c6
-
SHA512
e8a5be38e7f06b751068b3d43e56fe8a82d73c796e8f8044498878e1bd8cc7b0d497e34f81b74c753235e7af4a6a196981c515a4778fc7cc8a62ca7505fa3301
-
SSDEEP
3072:FaJvDmCOU4piJA7vrOaUNC3Hjljb7K/w/qKewWZIiB64d5vPtjnXuG:FaJvqvU4lrOR83U/wCwWqild5vPl
Score10/10-
Modifies firewall policy service
-
Modifies security service
-
Sets service image path in registry
-
Deletes itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-