General
-
Target
.exe
-
Size
9.7MB
-
Sample
230317-vjqzlsbc4y
-
MD5
b90ab62f77b2d68428b2b97839406169
-
SHA1
802d70cc8e5fbcf731645079589c75b97ea2169a
-
SHA256
597747f308b212a216f868a191b230df7ea5a46e055844e92e811f6e6de30f63
-
SHA512
d8d0332c1e0c500ef50c47287d7a334efb9ed0079fe344c3c8fea88179b9077744ba0534816a2bfd4cb6bfc4be8dbdbfe3b5e2378118aa10c29c6234cfa77611
-
SSDEEP
196608:9xL9HLAlndpb7KX/RdgHeNFiFJMIDJhgsAGKlRFyVKWzzBZpBkHgh0iT:bxAlndYX5R0FqyhgsSil/3si
Behavioral task
behavioral1
Sample
.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
.exe
-
Size
9.7MB
-
MD5
b90ab62f77b2d68428b2b97839406169
-
SHA1
802d70cc8e5fbcf731645079589c75b97ea2169a
-
SHA256
597747f308b212a216f868a191b230df7ea5a46e055844e92e811f6e6de30f63
-
SHA512
d8d0332c1e0c500ef50c47287d7a334efb9ed0079fe344c3c8fea88179b9077744ba0534816a2bfd4cb6bfc4be8dbdbfe3b5e2378118aa10c29c6234cfa77611
-
SSDEEP
196608:9xL9HLAlndpb7KX/RdgHeNFiFJMIDJhgsAGKlRFyVKWzzBZpBkHgh0iT:bxAlndYX5R0FqyhgsSil/3si
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-