General
-
Target
testpandirequests.exe.bin
-
Size
167KB
-
Sample
230505-zs963aee69
-
MD5
2c68cf0afa3c48c737b3751ccc373cbb
-
SHA1
1c097af0de509aa14d52630a84e814bae06ee4d9
-
SHA256
1afecf61614136499d6fd09238fb7900582bdd0487dd4ef1782862ed5c2dd09b
-
SHA512
0ba449d2bac3a962bc63fdc5966849ba83f04854ab110f6409b45423abf056f2fa1fc6880924326d6fd8e8e43bc91b3395ac79c79d7d5e3c14009c8a056b0e4f
-
SSDEEP
3072:+KzuRoHDIL06b4vIJq4NGDisYRrmWPyvW/fHPqScSoAAdbt:+Kzqma06b4QE43HPr
Behavioral task
behavioral1
Sample
testpandirequests.exe
Resource
win7-20230220-en
Malware Config
Extracted
gurcu
https://api.telegram.org/bot5975822207:AAFJtzAlzLoF8RfkpKUagQJGRi0ksib6w3g/sendMessage?chat_id=1396661331
Targets
-
-
Target
testpandirequests.exe.bin
-
Size
167KB
-
MD5
2c68cf0afa3c48c737b3751ccc373cbb
-
SHA1
1c097af0de509aa14d52630a84e814bae06ee4d9
-
SHA256
1afecf61614136499d6fd09238fb7900582bdd0487dd4ef1782862ed5c2dd09b
-
SHA512
0ba449d2bac3a962bc63fdc5966849ba83f04854ab110f6409b45423abf056f2fa1fc6880924326d6fd8e8e43bc91b3395ac79c79d7d5e3c14009c8a056b0e4f
-
SSDEEP
3072:+KzuRoHDIL06b4vIJq4NGDisYRrmWPyvW/fHPqScSoAAdbt:+Kzqma06b4QE43HPr
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-