General
-
Target
file.exe
-
Size
4.0MB
-
Sample
230608-y69l1sag51
-
MD5
27b17d2159cb2d376643dd6ecdd01224
-
SHA1
05d53771c76bf429ca338c4baed199152d714ce4
-
SHA256
625ab7856c3c34a7be37ae4d7cc640a775dbea37bf5e81c0716de2d80aadfc04
-
SHA512
9c8477a063afee5e583f564c7e4b584e2c38474b4c5e31bbaa3eaa9e26bfd742ca85960bf5199d2f9b1a42da27265486038e0bc87bae6dab6cb57d8d2090defb
-
SSDEEP
98304:Rp4/OosDaj0aK9xjcpzxoUVKz/PD091ky+6yq/vXX7P7CbXIKc5zD6sILTjblMSN:Jz/W1kBefiLIKcosI3jhMSN
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
file.exe
-
Size
4.0MB
-
MD5
27b17d2159cb2d376643dd6ecdd01224
-
SHA1
05d53771c76bf429ca338c4baed199152d714ce4
-
SHA256
625ab7856c3c34a7be37ae4d7cc640a775dbea37bf5e81c0716de2d80aadfc04
-
SHA512
9c8477a063afee5e583f564c7e4b584e2c38474b4c5e31bbaa3eaa9e26bfd742ca85960bf5199d2f9b1a42da27265486038e0bc87bae6dab6cb57d8d2090defb
-
SSDEEP
98304:Rp4/OosDaj0aK9xjcpzxoUVKz/PD091ky+6yq/vXX7P7CbXIKc5zD6sILTjblMSN:Jz/W1kBefiLIKcosI3jhMSN
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-