General
-
Target
060210cc7637d170e963a4873a03c103
-
Size
180KB
-
Sample
231225-fewxqsbdh5
-
MD5
060210cc7637d170e963a4873a03c103
-
SHA1
bddf8010fe6815056671d56cc1c3996155ff5953
-
SHA256
b4aeb2134f7a1ad5713e74686b8406b021cd991e2a0701dcf74b52f737aed07b
-
SHA512
3c1d3f06fbeccd9138f4533b9c93d8cf1cc6ad350cd134a193e71dd5c3254ec91b6a9c002d0e54a5d86e03fdb24f91347262f6f63aeb8b83c11b912ce24a1874
-
SSDEEP
3072:LDOGVDoOzGVv73HNYFg83zA8a7w/++ILFMKsvh4mMpA27RqpCwNLYpoAqQ:LDOAD3cdY53Ja7w/+ZLFhmMPQCWL9
Static task
static1
Behavioral task
behavioral1
Sample
060210cc7637d170e963a4873a03c103.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
060210cc7637d170e963a4873a03c103.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
060210cc7637d170e963a4873a03c103
-
Size
180KB
-
MD5
060210cc7637d170e963a4873a03c103
-
SHA1
bddf8010fe6815056671d56cc1c3996155ff5953
-
SHA256
b4aeb2134f7a1ad5713e74686b8406b021cd991e2a0701dcf74b52f737aed07b
-
SHA512
3c1d3f06fbeccd9138f4533b9c93d8cf1cc6ad350cd134a193e71dd5c3254ec91b6a9c002d0e54a5d86e03fdb24f91347262f6f63aeb8b83c11b912ce24a1874
-
SSDEEP
3072:LDOGVDoOzGVv73HNYFg83zA8a7w/++ILFMKsvh4mMpA27RqpCwNLYpoAqQ:LDOAD3cdY53Ja7w/+ZLFhmMPQCWL9
Score7/10-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Registers COM server for autorun
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-