General
-
Target
763217ce15ae2f67ba5de59fb446a1c3108d8b086aec89a14010d2269db26f46
-
Size
170KB
-
Sample
221204-aexldahe83
-
MD5
f1f8d1c0110bfbc64467bbc81c0a2398
-
SHA1
8c7d5543b56d28867e9ba0702f76af848e66b1dc
-
SHA256
763217ce15ae2f67ba5de59fb446a1c3108d8b086aec89a14010d2269db26f46
-
SHA512
b744fe3a5ab9d615897f01f4b15537c8518a251b40325d450b369327a86690881d93c23a0a89b61837a8a092a759df39f4c110a27e54a846cf5fbae4c188bf6a
-
SSDEEP
3072:uB+SKSgFHn9FSqpXTOPNx0U1wpjRIYkb3/XkhowiKhLiajBPnNWH3OrNEE:uB+SwyCIf0U1wFRQ/Xw3bjBPNWX6NEE
Static task
static1
Behavioral task
behavioral1
Sample
763217ce15ae2f67ba5de59fb446a1c3108d8b086aec89a14010d2269db26f46.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
763217ce15ae2f67ba5de59fb446a1c3108d8b086aec89a14010d2269db26f46.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
763217ce15ae2f67ba5de59fb446a1c3108d8b086aec89a14010d2269db26f46
-
Size
170KB
-
MD5
f1f8d1c0110bfbc64467bbc81c0a2398
-
SHA1
8c7d5543b56d28867e9ba0702f76af848e66b1dc
-
SHA256
763217ce15ae2f67ba5de59fb446a1c3108d8b086aec89a14010d2269db26f46
-
SHA512
b744fe3a5ab9d615897f01f4b15537c8518a251b40325d450b369327a86690881d93c23a0a89b61837a8a092a759df39f4c110a27e54a846cf5fbae4c188bf6a
-
SSDEEP
3072:uB+SKSgFHn9FSqpXTOPNx0U1wpjRIYkb3/XkhowiKhLiajBPnNWH3OrNEE:uB+SwyCIf0U1wFRQ/Xw3bjBPNWX6NEE
Score8/10-
Registers COM server for autorun
-
Deletes itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-