General
-
Target
40b0c540c33092c4272fc2405e0f443bcddb806617cda25c4f41cfff79a88e8c
-
Size
177KB
-
Sample
221205-sa3kyadg51
-
MD5
a4aed7889813f86a5b9180b2d4a7182e
-
SHA1
26f24b4819e7385bfe281cafb5935d1cc93e3565
-
SHA256
40b0c540c33092c4272fc2405e0f443bcddb806617cda25c4f41cfff79a88e8c
-
SHA512
a1cc1799c946c49a33ae218f810d4bbde08e75a0ff135821e4af52d18b0cafcaae9b31beb23aa83bc772fe4ff6be15e34f05afd52041e420d769e644e4bbb7e9
-
SSDEEP
3072:3VGWfJyPk0M2RdzOKf9S4085TqR7GCpmpWb+3TxUyOPAOM5OBG+udGaYZE:l1V0M2zT3u5Jpi++yyrOhYdqG
Static task
static1
Behavioral task
behavioral1
Sample
40b0c540c33092c4272fc2405e0f443bcddb806617cda25c4f41cfff79a88e8c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
40b0c540c33092c4272fc2405e0f443bcddb806617cda25c4f41cfff79a88e8c.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
40b0c540c33092c4272fc2405e0f443bcddb806617cda25c4f41cfff79a88e8c
-
Size
177KB
-
MD5
a4aed7889813f86a5b9180b2d4a7182e
-
SHA1
26f24b4819e7385bfe281cafb5935d1cc93e3565
-
SHA256
40b0c540c33092c4272fc2405e0f443bcddb806617cda25c4f41cfff79a88e8c
-
SHA512
a1cc1799c946c49a33ae218f810d4bbde08e75a0ff135821e4af52d18b0cafcaae9b31beb23aa83bc772fe4ff6be15e34f05afd52041e420d769e644e4bbb7e9
-
SSDEEP
3072:3VGWfJyPk0M2RdzOKf9S4085TqR7GCpmpWb+3TxUyOPAOM5OBG+udGaYZE:l1V0M2zT3u5Jpi++yyrOhYdqG
Score8/10-
Executes dropped EXE
-
Registers COM server for autorun
-
Deletes itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-