Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 13:05
Behavioral task
behavioral1
Sample
9797b28098e2ef2900560f181b160411.exe
Resource
win7-20231215-en
4 signatures
150 seconds
General
-
Target
9797b28098e2ef2900560f181b160411.exe
-
Size
37KB
-
MD5
9797b28098e2ef2900560f181b160411
-
SHA1
cd9319144e0e48dc392a6f8cf279a161a856f072
-
SHA256
c2aad05f9444b98c84f63e16b951ef17118802557a3ad19431c983132505596a
-
SHA512
5f286a1fed9283f80e8a6eab5282c17c15bec1d2c66a04d8c2af2d74d7488acee96e6accd1726ea0c4de9578c6c212a5dd6243154ce482ab77aa5c9e4b75d8a9
-
SSDEEP
384:HcIqNZOO+OreW5aQfGJ+v+O0MhUvYn/vEpI0Rrs+C3UpQfKhVTq:kDOO+OiQGC0EUvYHsI0+9U
Malware Config
Signatures
-
Detects Kaiten/Tsunami Payload 2 IoCs
resource yara_rule behavioral1/memory/3048-0-0x0000000000400000-0x000000000040B000-memory.dmp family_kaiten2 behavioral1/memory/3048-1-0x0000000000400000-0x000000000040B000-memory.dmp family_kaiten2 -
Detects Kaiten/Tsunami payload 2 IoCs
resource yara_rule behavioral1/memory/3048-0-0x0000000000400000-0x000000000040B000-memory.dmp family_kaiten behavioral1/memory/3048-1-0x0000000000400000-0x000000000040B000-memory.dmp family_kaiten -
resource yara_rule behavioral1/memory/3048-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/3048-1-0x0000000000400000-0x000000000040B000-memory.dmp upx