General
-
Target
6906872ca28ab6d56c8339b95d663696
-
Size
1.4MB
-
Sample
231219-vx44dsfbd8
-
MD5
6906872ca28ab6d56c8339b95d663696
-
SHA1
119c496ce63af7eb1e37a5d4cdffded1ce80bcb9
-
SHA256
a2a3f8907ff936adb1a66d8e83c64e0949ac0c0777d5c76856bb528b6a2e41bf
-
SHA512
bc2adbc4e86156948bdb6c97425776a2134ea2da05f743b43d84952f2b93060a93e9070fa3868469b8c7e4add4be0dfcaa7cceba025d4c3bf059b4285193a4ad
-
SSDEEP
24576:cxpXPaR2J33o3S7P5zuHHOF2ahfehMHsGKzOYf8EEvX3GZ1AY:spy+VDa8rtPvX3GZyY
Behavioral task
behavioral1
Sample
6906872ca28ab6d56c8339b95d663696.exe
Resource
win7-20231215-en
Malware Config
Extracted
socelars
http://www.iyiqian.com/
http://www.hbgents.top/
http://www.rsnzhy.com/
http://www.znsjis.top/
Targets
-
-
Target
6906872ca28ab6d56c8339b95d663696
-
Size
1.4MB
-
MD5
6906872ca28ab6d56c8339b95d663696
-
SHA1
119c496ce63af7eb1e37a5d4cdffded1ce80bcb9
-
SHA256
a2a3f8907ff936adb1a66d8e83c64e0949ac0c0777d5c76856bb528b6a2e41bf
-
SHA512
bc2adbc4e86156948bdb6c97425776a2134ea2da05f743b43d84952f2b93060a93e9070fa3868469b8c7e4add4be0dfcaa7cceba025d4c3bf059b4285193a4ad
-
SSDEEP
24576:cxpXPaR2J33o3S7P5zuHHOF2ahfehMHsGKzOYf8EEvX3GZ1AY:spy+VDa8rtPvX3GZyY
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-