General
-
Target
7435406860d3a8627ef93a25b5fa7bff5525e75afba06efd8e124ec533d3c78f
-
Size
212KB
-
Sample
221203-cg2zzsef46
-
MD5
96e5262b32bf1de48efd21274f412df5
-
SHA1
c32d21771600bc97d97c0568c290b621b588d095
-
SHA256
7435406860d3a8627ef93a25b5fa7bff5525e75afba06efd8e124ec533d3c78f
-
SHA512
ee24b12ab140ed7d1bc96270d14cfe1e80e89ca56b3f98351f4087e153fabdd11266e451a88d04c0d4965e8faf78b7645ef3acc5d7451b525e3758b22acb826f
-
SSDEEP
3072:WChJgYMm4xf9cU9KQ2BxA59SPMqOoen2:GYMm4xiWKQ2BiCM
Static task
static1
Behavioral task
behavioral1
Sample
7435406860d3a8627ef93a25b5fa7bff5525e75afba06efd8e124ec533d3c78f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7435406860d3a8627ef93a25b5fa7bff5525e75afba06efd8e124ec533d3c78f.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Targets
-
-
Target
7435406860d3a8627ef93a25b5fa7bff5525e75afba06efd8e124ec533d3c78f
-
Size
212KB
-
MD5
96e5262b32bf1de48efd21274f412df5
-
SHA1
c32d21771600bc97d97c0568c290b621b588d095
-
SHA256
7435406860d3a8627ef93a25b5fa7bff5525e75afba06efd8e124ec533d3c78f
-
SHA512
ee24b12ab140ed7d1bc96270d14cfe1e80e89ca56b3f98351f4087e153fabdd11266e451a88d04c0d4965e8faf78b7645ef3acc5d7451b525e3758b22acb826f
-
SSDEEP
3072:WChJgYMm4xf9cU9KQ2BxA59SPMqOoen2:GYMm4xiWKQ2BiCM
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-