General
-
Target
a2b8bd3ce91ce68dd2273021409303ee64e5528a6dc5a8dd169450fd59ed43e9
-
Size
135KB
-
Sample
221201-y27xmabe71
-
MD5
57098bd9d968e47a4380e4610f34e4ad
-
SHA1
98888c4be4a6153ed2ebbbd1a146cf910756b2e9
-
SHA256
a2b8bd3ce91ce68dd2273021409303ee64e5528a6dc5a8dd169450fd59ed43e9
-
SHA512
3faab93be088e8dc3d8c142c0396e69f59fd9b3e51776e507322d666191b2f1706fdda9e4af8920e7b031f95bb3ce463039f70302949ed71d492e3d273442be4
-
SSDEEP
3072:TFuAXp3T0O1+kbhDIsEuq+iLJrsJ4T6jNZIuJQk8vusHZGc:MAXBT0Abe4DiFrs9jrAkUus5
Static task
static1
Behavioral task
behavioral1
Sample
a2b8bd3ce91ce68dd2273021409303ee64e5528a6dc5a8dd169450fd59ed43e9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a2b8bd3ce91ce68dd2273021409303ee64e5528a6dc5a8dd169450fd59ed43e9.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
tofsee
91.218.38.245
188.165.132.183
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Targets
-
-
Target
a2b8bd3ce91ce68dd2273021409303ee64e5528a6dc5a8dd169450fd59ed43e9
-
Size
135KB
-
MD5
57098bd9d968e47a4380e4610f34e4ad
-
SHA1
98888c4be4a6153ed2ebbbd1a146cf910756b2e9
-
SHA256
a2b8bd3ce91ce68dd2273021409303ee64e5528a6dc5a8dd169450fd59ed43e9
-
SHA512
3faab93be088e8dc3d8c142c0396e69f59fd9b3e51776e507322d666191b2f1706fdda9e4af8920e7b031f95bb3ce463039f70302949ed71d492e3d273442be4
-
SSDEEP
3072:TFuAXp3T0O1+kbhDIsEuq+iLJrsJ4T6jNZIuJQk8vusHZGc:MAXBT0Abe4DiFrs9jrAkUus5
Score10/10-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-