General
-
Target
7e9a5e86b13cb88710088c0481a81075afb4b438a0d0c8806c73d4612eb6bb70
-
Size
4.0MB
-
Sample
230216-j21qzsgc71
-
MD5
1b221846fef3bd24482b9593f95a9416
-
SHA1
29a18e68b60fa3e67af101401e49dee01cc00b1b
-
SHA256
7e9a5e86b13cb88710088c0481a81075afb4b438a0d0c8806c73d4612eb6bb70
-
SHA512
b81ecf6740b671e3763a75226318a215d2986667f147285e08d65d3d7e2d9d00fbe8182cedf033172fd4d3b8e4b6dfd483db9e6548f25ea47479875c0b3d7818
-
SSDEEP
98304:40HPKDuRvdKbwblvaSV7vedE7n0vvldXbZp/qrdp4:eQIb2lvp7GdEbSllbn/l
Static task
static1
Malware Config
Targets
-
-
Target
7e9a5e86b13cb88710088c0481a81075afb4b438a0d0c8806c73d4612eb6bb70
-
Size
4.0MB
-
MD5
1b221846fef3bd24482b9593f95a9416
-
SHA1
29a18e68b60fa3e67af101401e49dee01cc00b1b
-
SHA256
7e9a5e86b13cb88710088c0481a81075afb4b438a0d0c8806c73d4612eb6bb70
-
SHA512
b81ecf6740b671e3763a75226318a215d2986667f147285e08d65d3d7e2d9d00fbe8182cedf033172fd4d3b8e4b6dfd483db9e6548f25ea47479875c0b3d7818
-
SSDEEP
98304:40HPKDuRvdKbwblvaSV7vedE7n0vvldXbZp/qrdp4:eQIb2lvp7GdEbSllbn/l
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies Windows Firewall
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-