General
-
Target
nagogy.bat
-
Size
825KB
-
Sample
230605-ha76bafb62
-
MD5
3904e52b3c695fc9ed5597ad43ad7e1e
-
SHA1
8d7e466864bfa7537174dbe4f415c441568eb256
-
SHA256
30721718265f7daf74537fa568538d7401eb2d4d44956a762a5554aea9125520
-
SHA512
5e6d13a315256c5e14085c88b81f9a19c42387b324ce75cc6fa85fa5f62ae77eb5e0e2cc17dd341c2afada8880793674f5edb542033fb8757b35356ff4551aec
-
SSDEEP
384:Kkolp89CairObhgpwcSCDNKv6xtdBANdRxtjSQwlJeEuiHovbwwTMZ/t2nOlfUcS:hToh1X6klJ7uiHovbEsfKZTTz2Ff
Static task
static1
Behavioral task
behavioral1
Sample
nagogy.bat
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
nagogy.bat
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
nagogy.bat
-
Size
825KB
-
MD5
3904e52b3c695fc9ed5597ad43ad7e1e
-
SHA1
8d7e466864bfa7537174dbe4f415c441568eb256
-
SHA256
30721718265f7daf74537fa568538d7401eb2d4d44956a762a5554aea9125520
-
SHA512
5e6d13a315256c5e14085c88b81f9a19c42387b324ce75cc6fa85fa5f62ae77eb5e0e2cc17dd341c2afada8880793674f5edb542033fb8757b35356ff4551aec
-
SSDEEP
384:Kkolp89CairObhgpwcSCDNKv6xtdBANdRxtjSQwlJeEuiHovbwwTMZ/t2nOlfUcS:hToh1X6klJ7uiHovbEsfKZTTz2Ff
Score8/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-