General
-
Target
140000000.filehistory.exe
-
Size
435KB
-
Sample
230420-ays3asgc91
-
MD5
fba73c5a9abd2782af4bcfbce153e299
-
SHA1
bee739c3bcc4f415ef1f363229efbedf359cab6d
-
SHA256
43cc6ed0dcd1fa220283f7bbfa79aaf6342fdb5e73cdabdde67debb7e2ffc945
-
SHA512
f73396c01cbea32fc751f392c1de1f1aed47ee1f687752136894b9091a93ddbe6d5ced8a9b48fe2df63c1d21661da3479d196cd0f31ab3dd10c2f4339ea67c0f
-
SSDEEP
12288:f8n3bVLUBUOw4ra554+zy+RG+EBH8ATUUC8up:mlG+G5p
Static task
static1
Behavioral task
behavioral1
Sample
140000000.filehistory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
140000000.filehistory.exe
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
140000000.filehistory.exe
-
Size
435KB
-
MD5
fba73c5a9abd2782af4bcfbce153e299
-
SHA1
bee739c3bcc4f415ef1f363229efbedf359cab6d
-
SHA256
43cc6ed0dcd1fa220283f7bbfa79aaf6342fdb5e73cdabdde67debb7e2ffc945
-
SHA512
f73396c01cbea32fc751f392c1de1f1aed47ee1f687752136894b9091a93ddbe6d5ced8a9b48fe2df63c1d21661da3479d196cd0f31ab3dd10c2f4339ea67c0f
-
SSDEEP
12288:f8n3bVLUBUOw4ra554+zy+RG+EBH8ATUUC8up:mlG+G5p
Score8/10-
Blocklisted process makes network request
-
Modifies Windows Firewall
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-