General
-
Target
816c23f58cea2059f6eb9fc73f346f9ca75c896be8e30d7bf88439806e711755
-
Size
206KB
-
Sample
221203-xdfb2aeg76
-
MD5
eef90d75e9a1d50a5edcd7205d6e0b87
-
SHA1
7e218ff779b1c010ae008bbfce807fe9f0666841
-
SHA256
816c23f58cea2059f6eb9fc73f346f9ca75c896be8e30d7bf88439806e711755
-
SHA512
c8ed2a8a5c107d0e4dccf47588abd8921ee0a29f34296ee55ff84cb407e234d7d7762e4dbc6726e0ecbe0ab073835da37257e5b6e8e3120a8b73262611bbae62
-
SSDEEP
6144:pdX766OnjvhX0QxOLwmYKj37jyN4ZDoM:pB7bMmtNv6gc
Static task
static1
Behavioral task
behavioral1
Sample
816c23f58cea2059f6eb9fc73f346f9ca75c896be8e30d7bf88439806e711755.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
816c23f58cea2059f6eb9fc73f346f9ca75c896be8e30d7bf88439806e711755.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
816c23f58cea2059f6eb9fc73f346f9ca75c896be8e30d7bf88439806e711755
-
Size
206KB
-
MD5
eef90d75e9a1d50a5edcd7205d6e0b87
-
SHA1
7e218ff779b1c010ae008bbfce807fe9f0666841
-
SHA256
816c23f58cea2059f6eb9fc73f346f9ca75c896be8e30d7bf88439806e711755
-
SHA512
c8ed2a8a5c107d0e4dccf47588abd8921ee0a29f34296ee55ff84cb407e234d7d7762e4dbc6726e0ecbe0ab073835da37257e5b6e8e3120a8b73262611bbae62
-
SSDEEP
6144:pdX766OnjvhX0QxOLwmYKj37jyN4ZDoM:pB7bMmtNv6gc
Score8/10-
Executes dropped EXE
-
Deletes itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-