General
-
Target
5bde93a5b5aae830c679e27355b96f03
-
Size
205KB
-
Sample
240115-cpngkafdgm
-
MD5
5bde93a5b5aae830c679e27355b96f03
-
SHA1
706c838773c4d3e180500d69b014293c20b791cb
-
SHA256
60e6ca57ad170ebb3663a4b0268ac5b8b562a528f6098c53c32bd35575a6b115
-
SHA512
4fefa406783cf8ff6f7fddd3faf06c32859ed10435c0923bcd9ae8ea9f38dde7cbcfa18a9790c196dd7493db7adba2044d5f6cf6c3d0f6e44f6184b6bb4d145f
-
SSDEEP
3072:qkag6TZtczX1j0/kyZDYcSzy4jS192k4DRl+EoRdZWPQP32wysbCrR6ZogW:qkag6Tczlj0J0x5Sr2tMSOmlsWISB
Static task
static1
Behavioral task
behavioral1
Sample
5bde93a5b5aae830c679e27355b96f03.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5bde93a5b5aae830c679e27355b96f03.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
5bde93a5b5aae830c679e27355b96f03
-
Size
205KB
-
MD5
5bde93a5b5aae830c679e27355b96f03
-
SHA1
706c838773c4d3e180500d69b014293c20b791cb
-
SHA256
60e6ca57ad170ebb3663a4b0268ac5b8b562a528f6098c53c32bd35575a6b115
-
SHA512
4fefa406783cf8ff6f7fddd3faf06c32859ed10435c0923bcd9ae8ea9f38dde7cbcfa18a9790c196dd7493db7adba2044d5f6cf6c3d0f6e44f6184b6bb4d145f
-
SSDEEP
3072:qkag6TZtczX1j0/kyZDYcSzy4jS192k4DRl+EoRdZWPQP32wysbCrR6ZogW:qkag6Tczlj0J0x5Sr2tMSOmlsWISB
Score7/10-
Deletes itself
-
Executes dropped EXE
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-