General
-
Target
bcdc4446d4cc6fcc9e04862eb1ff10196c85573de2927f9d537b7f68cab17e27
-
Size
4.0MB
-
Sample
230130-vr467sbc57
-
MD5
c3a304ae50be84bc01020626581e3a48
-
SHA1
35af3888b187ef9b061d6486d53fac896d47bdeb
-
SHA256
bcdc4446d4cc6fcc9e04862eb1ff10196c85573de2927f9d537b7f68cab17e27
-
SHA512
ea183e18a94ef8fc90e0ed41d1aa527c196667f665c23b0bcf5aaec9d01f5647437f586d15be5654e701f6c32d995bfd395d7c9be39d941e532962bc5dd0fce5
-
SSDEEP
98304:g6M2bvzaj15D6F8cjGh0bsjWclfDV1r9y+ql/xeRfq:TMaaj15WyMGyCxlfDV1r9yNxwfq
Static task
static1
Malware Config
Targets
-
-
Target
bcdc4446d4cc6fcc9e04862eb1ff10196c85573de2927f9d537b7f68cab17e27
-
Size
4.0MB
-
MD5
c3a304ae50be84bc01020626581e3a48
-
SHA1
35af3888b187ef9b061d6486d53fac896d47bdeb
-
SHA256
bcdc4446d4cc6fcc9e04862eb1ff10196c85573de2927f9d537b7f68cab17e27
-
SHA512
ea183e18a94ef8fc90e0ed41d1aa527c196667f665c23b0bcf5aaec9d01f5647437f586d15be5654e701f6c32d995bfd395d7c9be39d941e532962bc5dd0fce5
-
SSDEEP
98304:g6M2bvzaj15D6F8cjGh0bsjWclfDV1r9y+ql/xeRfq:TMaaj15WyMGyCxlfDV1r9yNxwfq
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-