Analysis

  • max time kernel
    91s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-04-2023 22:35

General

  • Target

    732e5e7cb01b5c3e58a69b265e244ea0178c0df385ec9caa27c205c9611ded85.exe

  • Size

    6.9MB

  • MD5

    b8baf2ba571747a1bd1c49b5f70cbb2b

  • SHA1

    9e4b373cbecaa047779164b2c62efbd56168a4b1

  • SHA256

    732e5e7cb01b5c3e58a69b265e244ea0178c0df385ec9caa27c205c9611ded85

  • SHA512

    18a799ee3448a6d2e64668a9f4d0b9620cbe9a33d68d74ff9ee694c258940eedc8c3ab02e56d723a84f31f8ceef7be8c532995ef6684797a2b39061bd22c4cd8

  • SSDEEP

    98304:p3rSvmmHEb/OZQ9DiQ0Hv/KYhnQ4Ql5gt/Gc:5rxmkz2Q9Di/Hv/KYhQ4Qzgt

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

Processes

  • C:\Users\Admin\AppData\Local\Temp\732e5e7cb01b5c3e58a69b265e244ea0178c0df385ec9caa27c205c9611ded85.exe
    "C:\Users\Admin\AppData\Local\Temp\732e5e7cb01b5c3e58a69b265e244ea0178c0df385ec9caa27c205c9611ded85.exe"
    1⤵
      PID:4296

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads