General
-
Target
3a1f9e592937513387c9c1880f795757
-
Size
156KB
-
Sample
231231-r2cm6afhfp
-
MD5
3a1f9e592937513387c9c1880f795757
-
SHA1
421b648186fb7be8e35c752f0aebf49aa0b702cb
-
SHA256
90922294e0c48386680d8bd3aa24f571746f2413c401c8b5e40a10e5dac859f2
-
SHA512
76a7693e5aaaabc25b1a9b036400617feeed5942cdae7fba9a8f5cccec22ab53140bd25f5f8e1a943a77dd49a02a49d03e4f3a62ae01e2d69b4be94185be5866
-
SSDEEP
3072:Z612XVqqVIAlGDInCOx7EVgeLCStSrsfp4ZdWh9NRI+JcMb8tyvl9RXECagIQCs7:I1MTZNiLCSSrc4ZdWh9tqit9WgFTDN1h
Static task
static1
Behavioral task
behavioral1
Sample
3a1f9e592937513387c9c1880f795757.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3a1f9e592937513387c9c1880f795757.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
3a1f9e592937513387c9c1880f795757
-
Size
156KB
-
MD5
3a1f9e592937513387c9c1880f795757
-
SHA1
421b648186fb7be8e35c752f0aebf49aa0b702cb
-
SHA256
90922294e0c48386680d8bd3aa24f571746f2413c401c8b5e40a10e5dac859f2
-
SHA512
76a7693e5aaaabc25b1a9b036400617feeed5942cdae7fba9a8f5cccec22ab53140bd25f5f8e1a943a77dd49a02a49d03e4f3a62ae01e2d69b4be94185be5866
-
SSDEEP
3072:Z612XVqqVIAlGDInCOx7EVgeLCStSrsfp4ZdWh9NRI+JcMb8tyvl9RXECagIQCs7:I1MTZNiLCSSrc4ZdWh9tqit9WgFTDN1h
Score7/10-
Deletes itself
-
Executes dropped EXE
-
Registers COM server for autorun
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Suspicious use of SetThreadContext
-