General
-
Target
f79b1d2a69030115077062365017f5ee7bceac61a96fb12fbda4a1a77862d3d6
-
Size
153KB
-
Sample
221201-lhjdpsee42
-
MD5
7cc39d3f4e1a7a3e12147343ecec6f6b
-
SHA1
c2fc74abd7078e9112212af346750ded9d6058b6
-
SHA256
f79b1d2a69030115077062365017f5ee7bceac61a96fb12fbda4a1a77862d3d6
-
SHA512
bd96df47be3130a71e40dbfc0363d9d4b8d6045105d1eb3d96265ec7736be20339be0267ba5f8da13cb3b2f4bcb5a6c042ae91a554e63f8f8817a92bc360fdee
-
SSDEEP
3072:Py4FkhMnelQ2+LYHb0PkXLqoE4P6JRzRojEAdVvV+ScKEQ:azHD7nE4yJRf8VcSL
Static task
static1
Behavioral task
behavioral1
Sample
f79b1d2a69030115077062365017f5ee7bceac61a96fb12fbda4a1a77862d3d6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f79b1d2a69030115077062365017f5ee7bceac61a96fb12fbda4a1a77862d3d6.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
f79b1d2a69030115077062365017f5ee7bceac61a96fb12fbda4a1a77862d3d6
-
Size
153KB
-
MD5
7cc39d3f4e1a7a3e12147343ecec6f6b
-
SHA1
c2fc74abd7078e9112212af346750ded9d6058b6
-
SHA256
f79b1d2a69030115077062365017f5ee7bceac61a96fb12fbda4a1a77862d3d6
-
SHA512
bd96df47be3130a71e40dbfc0363d9d4b8d6045105d1eb3d96265ec7736be20339be0267ba5f8da13cb3b2f4bcb5a6c042ae91a554e63f8f8817a92bc360fdee
-
SSDEEP
3072:Py4FkhMnelQ2+LYHb0PkXLqoE4P6JRzRojEAdVvV+ScKEQ:azHD7nE4yJRf8VcSL
Score8/10-
Executes dropped EXE
-
Registers COM server for autorun
-
Deletes itself
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-