General
-
Target
140000000.filehistory.exe
-
Size
435KB
-
Sample
230502-2k2aasch44
-
MD5
d1a29ae7e04374c4dd68058e51c7d55d
-
SHA1
23c3e319b1b301b00e52f950df00a9aa056f6cfd
-
SHA256
d471be2737c03a4adc00e5cec0e55a785ae718429f5d946a296c899bafa2c83d
-
SHA512
32ee15a2cbc897504efd45ba6d6e11355c069333ed31d0513957e2bad80ef8982f6c19e321cafc657c37b758d2b6735d6b5bdb26665cbbf34d266b65b7a88b87
-
SSDEEP
12288:US/t30aR8Ot+MVYH9mJ8fxsZTPM8VzT121n:L/lj9a+B
Static task
static1
Behavioral task
behavioral1
Sample
140000000.filehistory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
140000000.filehistory.exe
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
140000000.filehistory.exe
-
Size
435KB
-
MD5
d1a29ae7e04374c4dd68058e51c7d55d
-
SHA1
23c3e319b1b301b00e52f950df00a9aa056f6cfd
-
SHA256
d471be2737c03a4adc00e5cec0e55a785ae718429f5d946a296c899bafa2c83d
-
SHA512
32ee15a2cbc897504efd45ba6d6e11355c069333ed31d0513957e2bad80ef8982f6c19e321cafc657c37b758d2b6735d6b5bdb26665cbbf34d266b65b7a88b87
-
SSDEEP
12288:US/t30aR8Ot+MVYH9mJ8fxsZTPM8VzT121n:L/lj9a+B
Score8/10-
Blocklisted process makes network request
-
Modifies Windows Firewall
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-