General
-
Target
47e074748bc2524dadb7cbe2436b2736
-
Size
213KB
-
Sample
231226-bgc57ahhh2
-
MD5
47e074748bc2524dadb7cbe2436b2736
-
SHA1
d4abd105adeb7193347c656ab6385601c941e738
-
SHA256
02b76d6db95283892ea197e9facbb6caba8961eacf895c38f1756886f010c82f
-
SHA512
c222bb51ae9597a01aaf89aa5b3303cd295023483a8e714a8a594aaa8f1dc54916be1b76f03595afeadee332abd6503b796152b0e1dfe9961779937d7707cc8c
-
SSDEEP
3072:aJmgmR7tS/b/V2uXyEBr+msFwLNXs8qm8eicWjKZo285D4EVg:aIL+pjXyur+hFwL1Dz8eqOZo75D9V
Static task
static1
Behavioral task
behavioral1
Sample
47e074748bc2524dadb7cbe2436b2736.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
47e074748bc2524dadb7cbe2436b2736.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
47e074748bc2524dadb7cbe2436b2736
-
Size
213KB
-
MD5
47e074748bc2524dadb7cbe2436b2736
-
SHA1
d4abd105adeb7193347c656ab6385601c941e738
-
SHA256
02b76d6db95283892ea197e9facbb6caba8961eacf895c38f1756886f010c82f
-
SHA512
c222bb51ae9597a01aaf89aa5b3303cd295023483a8e714a8a594aaa8f1dc54916be1b76f03595afeadee332abd6503b796152b0e1dfe9961779937d7707cc8c
-
SSDEEP
3072:aJmgmR7tS/b/V2uXyEBr+msFwLNXs8qm8eicWjKZo285D4EVg:aIL+pjXyur+hFwL1Dz8eqOZo75D9V
Score7/10-
Deletes itself
-
Executes dropped EXE
-
Registers COM server for autorun
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-