General
-
Target
7094b9e15f54e0a9619fe6073988ee5c
-
Size
209KB
-
Sample
231219-wkzhtabga4
-
MD5
7094b9e15f54e0a9619fe6073988ee5c
-
SHA1
5cdc7829d5acedb7f1344ff541a2f962f27f5b01
-
SHA256
cb92d12ebe8e036b9ebd71dcc80f9187c13bd78ad7d6f4076159c053c4cab16f
-
SHA512
d5b2d1550f9aa60f4d468150f12d57e37b4090e22277f90ed44962995da4815cc6089e0ee2d1af187bf4b51925cab7631a6e87086621c431ea594c82fa578e83
-
SSDEEP
6144:YDnLgI91y1UkT57iJz/DpURWPSvHuUiYphu1UF:cnLh9yn52rpUR5vHuRYpM+F
Behavioral task
behavioral1
Sample
7094b9e15f54e0a9619fe6073988ee5c.exe
Resource
win7-20231129-en
Malware Config
Extracted
systembc
yan0212.com:4039
yan0212.net:4039
Targets
-
-
Target
7094b9e15f54e0a9619fe6073988ee5c
-
Size
209KB
-
MD5
7094b9e15f54e0a9619fe6073988ee5c
-
SHA1
5cdc7829d5acedb7f1344ff541a2f962f27f5b01
-
SHA256
cb92d12ebe8e036b9ebd71dcc80f9187c13bd78ad7d6f4076159c053c4cab16f
-
SHA512
d5b2d1550f9aa60f4d468150f12d57e37b4090e22277f90ed44962995da4815cc6089e0ee2d1af187bf4b51925cab7631a6e87086621c431ea594c82fa578e83
-
SSDEEP
6144:YDnLgI91y1UkT57iJz/DpURWPSvHuUiYphu1UF:cnLh9yn52rpUR5vHuRYpM+F
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Uses Tor communications
Malware can proxy its traffic through Tor for more anonymity.
-