General
-
Target
a2a9de151c592b7b30fb5b4d3585554fe63a45df11d28c46a3e3b7e631150cf4
-
Size
198KB
-
Sample
221201-y3dp6sgd45
-
MD5
bfc426e0bc8e604e2222ce9ae6d326fd
-
SHA1
7d857718fb2711f782cd95dcec052604d9987632
-
SHA256
a2a9de151c592b7b30fb5b4d3585554fe63a45df11d28c46a3e3b7e631150cf4
-
SHA512
cec223f2b78a2d726726574461ccfe99e84c7eb5c4f07eeba5bdf407dff80885966c0ea85209dfa92dde62b229963387afacbf187dbbce03de910ae6556d4b7f
-
SSDEEP
3072:6K2ADaRP/PSgBTvw7QbU7A0xogY4hrmZzgOJR0Dwy4enem5oaUpkqU:dh0P/6gC6UMcPrmZxJi5rCkv
Static task
static1
Behavioral task
behavioral1
Sample
a2a9de151c592b7b30fb5b4d3585554fe63a45df11d28c46a3e3b7e631150cf4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a2a9de151c592b7b30fb5b4d3585554fe63a45df11d28c46a3e3b7e631150cf4.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
a2a9de151c592b7b30fb5b4d3585554fe63a45df11d28c46a3e3b7e631150cf4
-
Size
198KB
-
MD5
bfc426e0bc8e604e2222ce9ae6d326fd
-
SHA1
7d857718fb2711f782cd95dcec052604d9987632
-
SHA256
a2a9de151c592b7b30fb5b4d3585554fe63a45df11d28c46a3e3b7e631150cf4
-
SHA512
cec223f2b78a2d726726574461ccfe99e84c7eb5c4f07eeba5bdf407dff80885966c0ea85209dfa92dde62b229963387afacbf187dbbce03de910ae6556d4b7f
-
SSDEEP
3072:6K2ADaRP/PSgBTvw7QbU7A0xogY4hrmZzgOJR0Dwy4enem5oaUpkqU:dh0P/6gC6UMcPrmZxJi5rCkv
Score8/10-
Executes dropped EXE
-
Registers COM server for autorun
-
Deletes itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-