General
-
Target
e024899665b99b66cafd62c809e354256556d2189aeaf995160849dedb1dc886
-
Size
5.1MB
-
Sample
230224-xj3phsab8t
-
MD5
e9ae314f7427e5ea9c2cc839831cf4cc
-
SHA1
dca2ce2f88279cb4aba64d69f90e076ed8959151
-
SHA256
e024899665b99b66cafd62c809e354256556d2189aeaf995160849dedb1dc886
-
SHA512
311971ff2160af9a947ab6e5192767c5420072f66c6d3ec77eb8aa9362a9517d4095941fe959589cd66cf7b9da07e75ac183e03505323707c761d96dbac11510
-
SSDEEP
98304:vT4pPO5Gn4SOAjkSvBTaPX+alSeReNBoDVF9of55zVM3TcfAtiZvk4Ul:vT62IBTamNPWOiQfB
Static task
static1
Malware Config
Extracted
amadey
3.65
77.73.134.27/8bmdh3Slb2/index.php
Targets
-
-
Target
e024899665b99b66cafd62c809e354256556d2189aeaf995160849dedb1dc886
-
Size
5.1MB
-
MD5
e9ae314f7427e5ea9c2cc839831cf4cc
-
SHA1
dca2ce2f88279cb4aba64d69f90e076ed8959151
-
SHA256
e024899665b99b66cafd62c809e354256556d2189aeaf995160849dedb1dc886
-
SHA512
311971ff2160af9a947ab6e5192767c5420072f66c6d3ec77eb8aa9362a9517d4095941fe959589cd66cf7b9da07e75ac183e03505323707c761d96dbac11510
-
SSDEEP
98304:vT4pPO5Gn4SOAjkSvBTaPX+alSeReNBoDVF9of55zVM3TcfAtiZvk4Ul:vT62IBTamNPWOiQfB
-
Detects PseudoManuscrypt payload
-
Modifies security service
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
PseudoManuscrypt
PseudoManuscrypt is a malware Lazarus’s Manuscrypt targeting government organizations and ICS.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
XMRig Miner payload
-
Downloads MZ/PE file
-
Stops running service(s)
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-