Analysis

  • max time kernel
    202s
  • max time network
    200s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 07:38

General

  • Target

    8ed479c11d0d0d8d75cc41d6ce055e79.exe

  • Size

    340KB

  • MD5

    8ed479c11d0d0d8d75cc41d6ce055e79

  • SHA1

    41a773237c6f2fc486f84a7fe16ebb6d699dce99

  • SHA256

    595ec4a586e890a2c205a7128a83c2c395dda9a71e159e7768056665b41de4fa

  • SHA512

    78445781939d34942f22ac49645b5cb7f160a8849bd5a3832866b05fc35d7185b25065228708665c51aae741f82d979a0b2313b5d7114fc811f4bead6fdb8856

  • SSDEEP

    6144:hBDkKrGvpd9AIAAObzDOQyLQumfF5Iuxrlrg5:hGa8Wpb1lrO

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ed479c11d0d0d8d75cc41d6ce055e79.exe
    "C:\Users\Admin\AppData\Local\Temp\8ed479c11d0d0d8d75cc41d6ce055e79.exe"
    1⤵
      PID:5052

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads