General
-
Target
67b5e01a3842eaf502bb0d050f9f5b27c6030aa56f61a7dfaeddaa1e7806e01c
-
Size
174KB
-
Sample
221201-eqhc2scg86
-
MD5
d21910dbe30fae3c1bb0f457f515c029
-
SHA1
8d1550542ac7087cb28f29746c165f1b9837a2fd
-
SHA256
67b5e01a3842eaf502bb0d050f9f5b27c6030aa56f61a7dfaeddaa1e7806e01c
-
SHA512
0f9e9d33fe6b80eae22f1709c54e0dfd15fb9be5d0054f56a9f2b62a8ede40f8d63ffda1bf13b5767cc6e0a342fa51706df4574d520ac423fafced214b7c55be
-
SSDEEP
3072:iNBQfRRWC9+qHZxIVZtcvq1LfVmUgeuelJY3D4mkxbS5pePl/dZP3Vlv2Pw:dfRb+KIVfjD4u1uz4c5p4/Hllv2Pw
Static task
static1
Behavioral task
behavioral1
Sample
67b5e01a3842eaf502bb0d050f9f5b27c6030aa56f61a7dfaeddaa1e7806e01c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
67b5e01a3842eaf502bb0d050f9f5b27c6030aa56f61a7dfaeddaa1e7806e01c.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
67b5e01a3842eaf502bb0d050f9f5b27c6030aa56f61a7dfaeddaa1e7806e01c
-
Size
174KB
-
MD5
d21910dbe30fae3c1bb0f457f515c029
-
SHA1
8d1550542ac7087cb28f29746c165f1b9837a2fd
-
SHA256
67b5e01a3842eaf502bb0d050f9f5b27c6030aa56f61a7dfaeddaa1e7806e01c
-
SHA512
0f9e9d33fe6b80eae22f1709c54e0dfd15fb9be5d0054f56a9f2b62a8ede40f8d63ffda1bf13b5767cc6e0a342fa51706df4574d520ac423fafced214b7c55be
-
SSDEEP
3072:iNBQfRRWC9+qHZxIVZtcvq1LfVmUgeuelJY3D4mkxbS5pePl/dZP3Vlv2Pw:dfRb+KIVfjD4u1uz4c5p4/Hllv2Pw
Score8/10-
Executes dropped EXE
-
Registers COM server for autorun
-
Deletes itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-