General
-
Target
c698686fdf4bbe640db7d72355c1279dad9f5085b330467dea30394a02502db4
-
Size
494KB
-
Sample
221204-n5qgmsbd8t
-
MD5
05f537218b477b54a15f9c6792774b8a
-
SHA1
6ba563ebe2f6a40c95c93a99082ce84247661edf
-
SHA256
c698686fdf4bbe640db7d72355c1279dad9f5085b330467dea30394a02502db4
-
SHA512
bb14500e5fcca8ab859a1238745473a221b8d45a676c407e313a5ef16105652f3560992abe16c0816ba3a7ec3647ce03c3fef9288b76e5f7a28e30034ea16d4b
-
SSDEEP
12288:ZDytqTV/RSEsYBl/u+uNKvfzj+5d/OCXzh5Enfc3mgDY2ecEiP/3IWVJ/ux8cXpW:ZDytqTV/RJv+5d2CLhnx/YW
Static task
static1
Behavioral task
behavioral1
Sample
c698686fdf4bbe640db7d72355c1279dad9f5085b330467dea30394a02502db4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c698686fdf4bbe640db7d72355c1279dad9f5085b330467dea30394a02502db4.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
introxas - Password:
dzonis
Targets
-
-
Target
c698686fdf4bbe640db7d72355c1279dad9f5085b330467dea30394a02502db4
-
Size
494KB
-
MD5
05f537218b477b54a15f9c6792774b8a
-
SHA1
6ba563ebe2f6a40c95c93a99082ce84247661edf
-
SHA256
c698686fdf4bbe640db7d72355c1279dad9f5085b330467dea30394a02502db4
-
SHA512
bb14500e5fcca8ab859a1238745473a221b8d45a676c407e313a5ef16105652f3560992abe16c0816ba3a7ec3647ce03c3fef9288b76e5f7a28e30034ea16d4b
-
SSDEEP
12288:ZDytqTV/RSEsYBl/u+uNKvfzj+5d/OCXzh5Enfc3mgDY2ecEiP/3IWVJ/ux8cXpW:ZDytqTV/RJv+5d2CLhnx/YW
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-