General
-
Target
e7f891e59c8be18563fea334da16d80c2242622c28d280aa72469fce36c53f39
-
Size
220KB
-
Sample
221207-lgdrtsgg4w
-
MD5
9ed5fddac20417cc7d033586089557e2
-
SHA1
7d5cff8e55ddb958558c3c798f177f023d31ba1f
-
SHA256
e7f891e59c8be18563fea334da16d80c2242622c28d280aa72469fce36c53f39
-
SHA512
ebb0ffa7ea551c6928701219c9353f78588b8f8c9ccbabb14e173bc1a408991c4233f81f9822dcc3b3613effe97628fa3bbd73a8ec8332eaf231e62cc85ebad2
-
SSDEEP
6144:BE5Sj6t+tEA0LEIm5V6ZrRN+hBcT4dng/G:C5SjzEPtGV6ZjZkdnSG
Static task
static1
Behavioral task
behavioral1
Sample
e7f891e59c8be18563fea334da16d80c2242622c28d280aa72469fce36c53f39.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e7f891e59c8be18563fea334da16d80c2242622c28d280aa72469fce36c53f39.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
e7f891e59c8be18563fea334da16d80c2242622c28d280aa72469fce36c53f39
-
Size
220KB
-
MD5
9ed5fddac20417cc7d033586089557e2
-
SHA1
7d5cff8e55ddb958558c3c798f177f023d31ba1f
-
SHA256
e7f891e59c8be18563fea334da16d80c2242622c28d280aa72469fce36c53f39
-
SHA512
ebb0ffa7ea551c6928701219c9353f78588b8f8c9ccbabb14e173bc1a408991c4233f81f9822dcc3b3613effe97628fa3bbd73a8ec8332eaf231e62cc85ebad2
-
SSDEEP
6144:BE5Sj6t+tEA0LEIm5V6ZrRN+hBcT4dng/G:C5SjzEPtGV6ZjZkdnSG
Score8/10-
Executes dropped EXE
-
Deletes itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-