General
-
Target
4ab0df1fb21986a2868221e3be977a8fc980f9e39fabe0646021ab516b385ab1
-
Size
206KB
-
Sample
221201-1a43rsfg6z
-
MD5
2f836cf1ce1308d1ddf6835493daa3ec
-
SHA1
eccec97d7d7f7fddcc54535bd3292ccc52f79ae0
-
SHA256
4ab0df1fb21986a2868221e3be977a8fc980f9e39fabe0646021ab516b385ab1
-
SHA512
2e6faeb544bf3a5a87f63fbf654dc1a6f8e3e1acb177326ce2c57449f83b30e731511690134fb225b959233c719773841fd1f858b007eff53e947880edb134be
-
SSDEEP
3072:vpIbl6hJZQbumFaN28iv0DquqnLWZUBm41orRV/+kA9L0l7IfGoHarQkC4OteVZJ:OYhJZQJa+sqnLr841k/Jl7ro+C4XHEM
Static task
static1
Behavioral task
behavioral1
Sample
4ab0df1fb21986a2868221e3be977a8fc980f9e39fabe0646021ab516b385ab1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4ab0df1fb21986a2868221e3be977a8fc980f9e39fabe0646021ab516b385ab1.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
4ab0df1fb21986a2868221e3be977a8fc980f9e39fabe0646021ab516b385ab1
-
Size
206KB
-
MD5
2f836cf1ce1308d1ddf6835493daa3ec
-
SHA1
eccec97d7d7f7fddcc54535bd3292ccc52f79ae0
-
SHA256
4ab0df1fb21986a2868221e3be977a8fc980f9e39fabe0646021ab516b385ab1
-
SHA512
2e6faeb544bf3a5a87f63fbf654dc1a6f8e3e1acb177326ce2c57449f83b30e731511690134fb225b959233c719773841fd1f858b007eff53e947880edb134be
-
SSDEEP
3072:vpIbl6hJZQbumFaN28iv0DquqnLWZUBm41orRV/+kA9L0l7IfGoHarQkC4OteVZJ:OYhJZQJa+sqnLr841k/Jl7ro+C4XHEM
Score8/10-
Executes dropped EXE
-
Deletes itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-