General
-
Target
IMG001.exe
-
Size
3.4MB
-
Sample
230615-pxk3magh8y
-
MD5
979f00d5eadab60eb68529c990e49896
-
SHA1
d01397159c414eaf5a7ab0e092c662e8b3a0eadc
-
SHA256
b21cc3afe552b093b598fc93a023897acd91ebcb8dc045f16463962dcfacf9d0
-
SHA512
1fe39bd6c786831db279c2e50a095894cf79ac82662cf8167864ec2587e857423e8441a358daa25ade88cb72ab763f0323a0f4b02c8a6864eb3fed786d6f93eb
-
SSDEEP
98304:MdVPnq1y5tQOM33ZNqCtBixHl54Oyjes1boI:KVPq1yLanrqTr43eSz
Static task
static1
Behavioral task
behavioral1
Sample
IMG001.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
IMG001.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
Protocol: ftp- Host:
79.96.170.1 - Port:
21 - Username:
administrator - Password:
987654321
Extracted
Protocol: ftp- Host:
119.51.163.0 - Port:
21 - Username:
user - Password:
784512
Extracted
Protocol: ftp- Host:
49.76.187.3 - Port:
21 - Username:
admin - Password:
PC123
Extracted
Protocol: ftp- Host:
1.179.76.7 - Port:
21 - Username:
user
Extracted
Protocol: ftp- Host:
183.181.89.9 - Port:
21 - Username:
ftp - Password:
iloveyou
Extracted
Protocol: ftp- Host:
165.22.62.9 - Port:
21 - Username:
admin - Password:
VQsaBLPzLa
Targets
-
-
Target
IMG001.exe
-
Size
3.4MB
-
MD5
979f00d5eadab60eb68529c990e49896
-
SHA1
d01397159c414eaf5a7ab0e092c662e8b3a0eadc
-
SHA256
b21cc3afe552b093b598fc93a023897acd91ebcb8dc045f16463962dcfacf9d0
-
SHA512
1fe39bd6c786831db279c2e50a095894cf79ac82662cf8167864ec2587e857423e8441a358daa25ade88cb72ab763f0323a0f4b02c8a6864eb3fed786d6f93eb
-
SSDEEP
98304:MdVPnq1y5tQOM33ZNqCtBixHl54Oyjes1boI:KVPq1yLanrqTr43eSz
Score10/10-
Contacts a large (885) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-