General
-
Target
FpsBooster+Graphicsoptimize.bat
-
Size
968KB
-
Sample
230616-zrqq2agc9x
-
MD5
e00705b9d0c35b516a67dae6e07d84be
-
SHA1
ce8bdef78acf013674990a24c81984bcd74aaaf8
-
SHA256
0024b2cef968260b9903796d03f48ab7b4a50910c4b9af9a3441c144c04071e1
-
SHA512
71e700d2001f24683f6d685fa3349cc03f776d076351e22f3064c240a79f309180a118571bc30f10bb543bef4a1ae7b051891cf13108a14d156a99f0e5af42ea
-
SSDEEP
768:9h6iJGPKRTQyv58VDlMhofB7X/DvkCnHfumzn2SVB:bmPKRTxv5gDlKopXoS2K2Sr
Static task
static1
Behavioral task
behavioral1
Sample
FpsBooster+Graphicsoptimize.bat
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
FpsBooster+Graphicsoptimize.bat
Resource
win10v2004-20230220-en
Malware Config
Extracted
https://discord.com/api/webhooks/1119236643715551352/ZWq4_X5KEJF0wIoYwa36iTqAQDD4P_Z7M8Ugu_VIC9W_y-1GUf-JyWDOjo6TpgCADS25
Targets
-
-
Target
FpsBooster+Graphicsoptimize.bat
-
Size
968KB
-
MD5
e00705b9d0c35b516a67dae6e07d84be
-
SHA1
ce8bdef78acf013674990a24c81984bcd74aaaf8
-
SHA256
0024b2cef968260b9903796d03f48ab7b4a50910c4b9af9a3441c144c04071e1
-
SHA512
71e700d2001f24683f6d685fa3349cc03f776d076351e22f3064c240a79f309180a118571bc30f10bb543bef4a1ae7b051891cf13108a14d156a99f0e5af42ea
-
SSDEEP
768:9h6iJGPKRTQyv58VDlMhofB7X/DvkCnHfumzn2SVB:bmPKRTxv5gDlKopXoS2K2Sr
Score10/10-
Blocklisted process makes network request
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-