General
-
Target
492f3ba9a27325ee5f5a5aca19fb181e868797df58976b7df493e889b28072b9
-
Size
139KB
-
Sample
221201-q8pevsea92
-
MD5
cea22aa8e58db2653d4c7859849bf908
-
SHA1
72468a059aaf4f5df54379789eaa07468807834f
-
SHA256
492f3ba9a27325ee5f5a5aca19fb181e868797df58976b7df493e889b28072b9
-
SHA512
4b64d2902ec2f397dbc00e7bb25a29e09580c9effb5791d8aaf3e36f24642ac67cb576c828cb393003834bd193a3bcc2d129aee06addb729ede9a823e24179fd
-
SSDEEP
3072:ovjCjYbxolw+B8eI4776R+8IcBVVgIo1Z6yTJ4mXzu78:t4IcBoNZG
Static task
static1
Behavioral task
behavioral1
Sample
492f3ba9a27325ee5f5a5aca19fb181e868797df58976b7df493e889b28072b9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
492f3ba9a27325ee5f5a5aca19fb181e868797df58976b7df493e889b28072b9.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
Protocol: smtp- Host:
smtps.uol.com.br - Port:
587 - Username:
[email protected] - Password:
frd2008
Targets
-
-
Target
492f3ba9a27325ee5f5a5aca19fb181e868797df58976b7df493e889b28072b9
-
Size
139KB
-
MD5
cea22aa8e58db2653d4c7859849bf908
-
SHA1
72468a059aaf4f5df54379789eaa07468807834f
-
SHA256
492f3ba9a27325ee5f5a5aca19fb181e868797df58976b7df493e889b28072b9
-
SHA512
4b64d2902ec2f397dbc00e7bb25a29e09580c9effb5791d8aaf3e36f24642ac67cb576c828cb393003834bd193a3bcc2d129aee06addb729ede9a823e24179fd
-
SSDEEP
3072:ovjCjYbxolw+B8eI4776R+8IcBVVgIo1Z6yTJ4mXzu78:t4IcBoNZG
Score10/10-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-