General
-
Target
TelegCN4.12.msi
-
Size
56.3MB
-
Sample
230809-n46ggaba62
-
MD5
990f66c0fd150ec9a1a807326f71dc5d
-
SHA1
56aeed18f7e9ac71cff0111231d2a32d465737bb
-
SHA256
d4a209ac6981db5c2d7dd8aa7392564cfbcca8bc66e19ee5543ab345d82f0529
-
SHA512
dacbf464731627f221aa40ba7bdb76b703a97910bad93583d20ac930b467f1f311f21512bede6096b0556e7075fd136bc0c3145fa392f6e2523527ed0f9632b0
-
SSDEEP
1572864:zii8ks/kE4Gbo3uZvS/FWhEjVIouVzJ2VT6CWJLrVWQTsm:zNc/+R+Z6/FfjVI3V92VTE5q
Static task
static1
Behavioral task
behavioral1
Sample
TelegCN4.12.msi
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
TelegCN4.12.msi
Resource
win10-20230703-en
Behavioral task
behavioral3
Sample
TelegCN4.12.msi
Resource
win10v2004-20230703-en
Malware Config
Targets
-
-
Target
TelegCN4.12.msi
-
Size
56.3MB
-
MD5
990f66c0fd150ec9a1a807326f71dc5d
-
SHA1
56aeed18f7e9ac71cff0111231d2a32d465737bb
-
SHA256
d4a209ac6981db5c2d7dd8aa7392564cfbcca8bc66e19ee5543ab345d82f0529
-
SHA512
dacbf464731627f221aa40ba7bdb76b703a97910bad93583d20ac930b467f1f311f21512bede6096b0556e7075fd136bc0c3145fa392f6e2523527ed0f9632b0
-
SSDEEP
1572864:zii8ks/kE4Gbo3uZvS/FWhEjVIouVzJ2VT6CWJLrVWQTsm:zNc/+R+Z6/FfjVI3V92VTE5q
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-