General
-
Target
822852617fc3e5649de0647969a8d9aaed12a52af2db3bb72d310a8466abf6c9
-
Size
188KB
-
Sample
221202-xf6a8sgg3y
-
MD5
396d5216a867ebe67ca8db94ccd91a55
-
SHA1
31878f45ef6d1e72a0bb9cf6525ec8edaf06473f
-
SHA256
822852617fc3e5649de0647969a8d9aaed12a52af2db3bb72d310a8466abf6c9
-
SHA512
6a803c0cbc0303b5456073fa8827520994f5250a286adff3ea735f62398589ee5a818ca6b57666681fd6285dd7b64c48e973ab0843b6620130c07c366b3ba187
-
SSDEEP
3072:p+ip66I8Xt3+dQc6hND8aJRWrmtVYkvqJerZam5/VdXhUOQF5/SnB9EF:lLI89aIwaJcmtxOKZayC7/qB9
Static task
static1
Behavioral task
behavioral1
Sample
822852617fc3e5649de0647969a8d9aaed12a52af2db3bb72d310a8466abf6c9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
822852617fc3e5649de0647969a8d9aaed12a52af2db3bb72d310a8466abf6c9.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
822852617fc3e5649de0647969a8d9aaed12a52af2db3bb72d310a8466abf6c9
-
Size
188KB
-
MD5
396d5216a867ebe67ca8db94ccd91a55
-
SHA1
31878f45ef6d1e72a0bb9cf6525ec8edaf06473f
-
SHA256
822852617fc3e5649de0647969a8d9aaed12a52af2db3bb72d310a8466abf6c9
-
SHA512
6a803c0cbc0303b5456073fa8827520994f5250a286adff3ea735f62398589ee5a818ca6b57666681fd6285dd7b64c48e973ab0843b6620130c07c366b3ba187
-
SSDEEP
3072:p+ip66I8Xt3+dQc6hND8aJRWrmtVYkvqJerZam5/VdXhUOQF5/SnB9EF:lLI89aIwaJcmtxOKZayC7/qB9
Score8/10-
Registers COM server for autorun
-
Deletes itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-