General
-
Target
baa6615943306b28442a2afeaeaca01d5b55095349f953a38e7f53dfdcedf334
-
Size
213KB
-
Sample
221203-g624habh95
-
MD5
39f524f427276be06111a023a5eb3dda
-
SHA1
97d45ccb4b9819de23accb0707043a2681bfedeb
-
SHA256
baa6615943306b28442a2afeaeaca01d5b55095349f953a38e7f53dfdcedf334
-
SHA512
5dfb53adcafdd30887d2b4492e859a458f0a93dd5579f31dffbe8f3d6f8e432f02ceda957baf57ba4b5538b2a2e9561db7e5c4a473a90ad01cd5ce4de906124b
-
SSDEEP
6144:XinTUy3cAG/eXVLOPWmO7cM5oWz0xZZkfy/K/o+:6TU1mXVKO7P5lA2d
Static task
static1
Behavioral task
behavioral1
Sample
baa6615943306b28442a2afeaeaca01d5b55095349f953a38e7f53dfdcedf334.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
baa6615943306b28442a2afeaeaca01d5b55095349f953a38e7f53dfdcedf334.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
baa6615943306b28442a2afeaeaca01d5b55095349f953a38e7f53dfdcedf334
-
Size
213KB
-
MD5
39f524f427276be06111a023a5eb3dda
-
SHA1
97d45ccb4b9819de23accb0707043a2681bfedeb
-
SHA256
baa6615943306b28442a2afeaeaca01d5b55095349f953a38e7f53dfdcedf334
-
SHA512
5dfb53adcafdd30887d2b4492e859a458f0a93dd5579f31dffbe8f3d6f8e432f02ceda957baf57ba4b5538b2a2e9561db7e5c4a473a90ad01cd5ce4de906124b
-
SSDEEP
6144:XinTUy3cAG/eXVLOPWmO7cM5oWz0xZZkfy/K/o+:6TU1mXVKO7P5lA2d
Score10/10-
Modifies firewall policy service
-
Modifies security service
-
Executes dropped EXE
-
Registers COM server for autorun
-
Deletes itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-