General
-
Target
test1.exe
-
Size
22.3MB
-
Sample
230309-yn5v4saa36
-
MD5
2965f239700d5553e4715a33a9aba343
-
SHA1
2a163694a1541a3e87f398baf8c8add2cfcde573
-
SHA256
155acacc9dbdd980acd5f21302ad1cae17a6a7cad347340e24e1f1623c071d30
-
SHA512
d88a9138a3eb28861abcedb7d1407cece6f6ad7dce3c6ba1b3eea0f8a0301b4a63fe5b21648274c87becd619960a728083185a61250ed507f2ebf0021f980142
-
SSDEEP
393216:QxAlndYXAnAu0ptXr4/L4+j4/m3psp7QfRopv8FRGFor5knmz9kZcnfMb43U:lldYXAnA9ptXr8404KsWvbGZnmz9kZQ3
Malware Config
Targets
-
-
Target
test1.exe
-
Size
22.3MB
-
MD5
2965f239700d5553e4715a33a9aba343
-
SHA1
2a163694a1541a3e87f398baf8c8add2cfcde573
-
SHA256
155acacc9dbdd980acd5f21302ad1cae17a6a7cad347340e24e1f1623c071d30
-
SHA512
d88a9138a3eb28861abcedb7d1407cece6f6ad7dce3c6ba1b3eea0f8a0301b4a63fe5b21648274c87becd619960a728083185a61250ed507f2ebf0021f980142
-
SSDEEP
393216:QxAlndYXAnAu0ptXr4/L4+j4/m3psp7QfRopv8FRGFor5knmz9kZcnfMb43U:lldYXAnA9ptXr8404KsWvbGZnmz9kZQ3
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-