General
-
Target
7ebed8205611f34363bc35484fdfaba6da74b5de9e9c1128041bc9cb6e232664exe_JC.exe
-
Size
460KB
-
Sample
230806-l6nckaae4y
-
MD5
3cccb0426afe6bc0ff4dfc4a071e46d1
-
SHA1
31273d47ef275f8c2fd537806bff7bc1e95f7060
-
SHA256
7ebed8205611f34363bc35484fdfaba6da74b5de9e9c1128041bc9cb6e232664
-
SHA512
e05347abf93f333d88dd1a8dc3693f55a677fa466edf0059986beedf2af3dfe0c6f8f19828bc82205f863d2e9b2bde499cf8761aa54c9c783117fcf3dd3c4078
-
SSDEEP
12288:9uiy8Y80UbUMg0HqBNYzM8H03kKuIZHv:9/ttFg0HXTH0zu4Hv
Static task
static1
Behavioral task
behavioral1
Sample
7ebed8205611f34363bc35484fdfaba6da74b5de9e9c1128041bc9cb6e232664exe_JC.exe
Resource
win7-20230712-en
Malware Config
Targets
-
-
Target
7ebed8205611f34363bc35484fdfaba6da74b5de9e9c1128041bc9cb6e232664exe_JC.exe
-
Size
460KB
-
MD5
3cccb0426afe6bc0ff4dfc4a071e46d1
-
SHA1
31273d47ef275f8c2fd537806bff7bc1e95f7060
-
SHA256
7ebed8205611f34363bc35484fdfaba6da74b5de9e9c1128041bc9cb6e232664
-
SHA512
e05347abf93f333d88dd1a8dc3693f55a677fa466edf0059986beedf2af3dfe0c6f8f19828bc82205f863d2e9b2bde499cf8761aa54c9c783117fcf3dd3c4078
-
SSDEEP
12288:9uiy8Y80UbUMg0HqBNYzM8H03kKuIZHv:9/ttFg0HXTH0zu4Hv
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-