General
-
Target
406cba3a963b63bcf3936c372ed624dc2b0bdb68b7895d604bb25f26bd21bf49
-
Size
198KB
-
Sample
221201-gadq2ahe44
-
MD5
fe40cbdd1b491492d67f1caee0f3a19f
-
SHA1
6bc2a2d0d957f4e2f3a85d6b04569c0819f50e4b
-
SHA256
406cba3a963b63bcf3936c372ed624dc2b0bdb68b7895d604bb25f26bd21bf49
-
SHA512
ef341a7cd493858b32acfdfb9a759dcc985b8f95bf13d800f0e32b0c6d5a1f6bf540b53e003906ef3b213d2331ecf571c5bdfda6a9d8c1ee68edfe7bd90e4887
-
SSDEEP
6144:WLRlhbR/IEipEN7bge9cZzeWbI8ib0TSAeaa7A8ZU:WdPOnERUoc8qI8Mab8Z
Static task
static1
Behavioral task
behavioral1
Sample
406cba3a963b63bcf3936c372ed624dc2b0bdb68b7895d604bb25f26bd21bf49.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
406cba3a963b63bcf3936c372ed624dc2b0bdb68b7895d604bb25f26bd21bf49.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
406cba3a963b63bcf3936c372ed624dc2b0bdb68b7895d604bb25f26bd21bf49
-
Size
198KB
-
MD5
fe40cbdd1b491492d67f1caee0f3a19f
-
SHA1
6bc2a2d0d957f4e2f3a85d6b04569c0819f50e4b
-
SHA256
406cba3a963b63bcf3936c372ed624dc2b0bdb68b7895d604bb25f26bd21bf49
-
SHA512
ef341a7cd493858b32acfdfb9a759dcc985b8f95bf13d800f0e32b0c6d5a1f6bf540b53e003906ef3b213d2331ecf571c5bdfda6a9d8c1ee68edfe7bd90e4887
-
SSDEEP
6144:WLRlhbR/IEipEN7bge9cZzeWbI8ib0TSAeaa7A8ZU:WdPOnERUoc8qI8Mab8Z
Score8/10-
Executes dropped EXE
-
Registers COM server for autorun
-
Deletes itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-