General
-
Target
1632-2-0x0000000000400000-0x000000000040B000-memory.dmp
-
Size
44KB
-
Sample
231108-q9el2sdd28
-
MD5
57e737527dadb8f43ef0856c21080f8c
-
SHA1
4b1b7cb83ae0d34b46e20629dd735ed79ddd2a0c
-
SHA256
a53a282dfa2097c14cf9f67251ad27148f4afcd4c5745909dec1b80d9cb86119
-
SHA512
5e0deb20a7de065f056b6d7cc366b18d1aa3dbabd5c8da99eef7943afe6579a29cd72379894ec4d8c4e34c795a08249c3af82b84345228e295ffdf6a21b4a529
-
SSDEEP
384:xhnyaz2ypQY5ZkV6BjqvhyY3Q6oVxYshTCY3WqPakgUt11iyBrUo7MgImBH+Tp:GnHY5ZkAF4hyYtoVxYshem1oUt1vnhBa
Behavioral task
behavioral1
Sample
1632-2-0x0000000000400000-0x000000000040B000-memory.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
1632-2-0x0000000000400000-0x000000000040B000-memory.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
sakula
http://vpn.premrera.com:443/viewpre.asp?cstring=%s&tom=%d&id=%d
http://vpn.premrera.com:443/photo/%s.jpg?id=%d
http://173.254.226.212:443/viewpre.asp?cstring=%s&tom=%d&id=%d
http://173.254.226.212:443/photo/%s.jpg?id=%d
Targets
-
-
Target
1632-2-0x0000000000400000-0x000000000040B000-memory.dmp
-
Size
44KB
-
MD5
57e737527dadb8f43ef0856c21080f8c
-
SHA1
4b1b7cb83ae0d34b46e20629dd735ed79ddd2a0c
-
SHA256
a53a282dfa2097c14cf9f67251ad27148f4afcd4c5745909dec1b80d9cb86119
-
SHA512
5e0deb20a7de065f056b6d7cc366b18d1aa3dbabd5c8da99eef7943afe6579a29cd72379894ec4d8c4e34c795a08249c3af82b84345228e295ffdf6a21b4a529
-
SSDEEP
384:xhnyaz2ypQY5ZkV6BjqvhyY3Q6oVxYshTCY3WqPakgUt11iyBrUo7MgImBH+Tp:GnHY5ZkAF4hyYtoVxYshem1oUt1vnhBa
Score3/10 -