General
-
Target
10fc04298c934e896a333c2c13386291d5dd33304bf5f0af90636f86c28d460b
-
Size
1.6MB
-
Sample
221128-mqpfcscd9v
-
MD5
64d515247b8388fdacf4e0450a3a9c6f
-
SHA1
8eeadf672a3523442f224484a11f9f49cbcc6de7
-
SHA256
10fc04298c934e896a333c2c13386291d5dd33304bf5f0af90636f86c28d460b
-
SHA512
b644ccc09c96fd02839668561d992fd8f3a804d95d5cafc904e2293362e9ec1a4718cb89ddcb54d99dd0eae704c80d27e7f1d8b3882c0c308168ffe8d3830185
-
SSDEEP
24576:e/bH/oLrO40yatxnq0J9Ctc6TLrZiHA/P8TY+ltvK9lRRlIvn47UK:eDn4S9CCqqY+ltvKh3847UK
Static task
static1
Behavioral task
behavioral1
Sample
10fc04298c934e896a333c2c13386291d5dd33304bf5f0af90636f86c28d460b.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
10fc04298c934e896a333c2c13386291d5dd33304bf5f0af90636f86c28d460b.dll
Resource
win10v2004-20221111-en
Malware Config
Extracted
bandook
kaliex.net
Targets
-
-
Target
10fc04298c934e896a333c2c13386291d5dd33304bf5f0af90636f86c28d460b
-
Size
1.6MB
-
MD5
64d515247b8388fdacf4e0450a3a9c6f
-
SHA1
8eeadf672a3523442f224484a11f9f49cbcc6de7
-
SHA256
10fc04298c934e896a333c2c13386291d5dd33304bf5f0af90636f86c28d460b
-
SHA512
b644ccc09c96fd02839668561d992fd8f3a804d95d5cafc904e2293362e9ec1a4718cb89ddcb54d99dd0eae704c80d27e7f1d8b3882c0c308168ffe8d3830185
-
SSDEEP
24576:e/bH/oLrO40yatxnq0J9Ctc6TLrZiHA/P8TY+ltvK9lRRlIvn47UK:eDn4S9CCqqY+ltvKh3847UK
Score10/10-
Bandook payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-