General
-
Target
a6b6e41c3583f96cb61545b95995c50991d59fa4c7118150e7657ddba1d19912
-
Size
202KB
-
Sample
221129-ee3jvafh91
-
MD5
73b5eb1c16dae80be4aec4b8c57c70c3
-
SHA1
40b389a3ab5d4fe5970bb1e1d8f6a1b1e72bdd9b
-
SHA256
a6b6e41c3583f96cb61545b95995c50991d59fa4c7118150e7657ddba1d19912
-
SHA512
70e7c4dd48560dc881fcd16afdf10e414962c7048a8d9fd9af720c1bf23bd8a13fd895e7788200e980bf071fd33c15044d83f81d9fbb6b1471edcb981cabf3f7
-
SSDEEP
6144:FWxNsdTPUjofn06FWfuDjKNlBklj39w9TE518zpP4:MxNsdln0aWfuD+5klj39ww8W
Static task
static1
Behavioral task
behavioral1
Sample
a6b6e41c3583f96cb61545b95995c50991d59fa4c7118150e7657ddba1d19912.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a6b6e41c3583f96cb61545b95995c50991d59fa4c7118150e7657ddba1d19912.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
a6b6e41c3583f96cb61545b95995c50991d59fa4c7118150e7657ddba1d19912
-
Size
202KB
-
MD5
73b5eb1c16dae80be4aec4b8c57c70c3
-
SHA1
40b389a3ab5d4fe5970bb1e1d8f6a1b1e72bdd9b
-
SHA256
a6b6e41c3583f96cb61545b95995c50991d59fa4c7118150e7657ddba1d19912
-
SHA512
70e7c4dd48560dc881fcd16afdf10e414962c7048a8d9fd9af720c1bf23bd8a13fd895e7788200e980bf071fd33c15044d83f81d9fbb6b1471edcb981cabf3f7
-
SSDEEP
6144:FWxNsdTPUjofn06FWfuDjKNlBklj39w9TE518zpP4:MxNsdln0aWfuD+5klj39ww8W
Score8/10-
Executes dropped EXE
-
Registers COM server for autorun
-
Deletes itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-