General
-
Target
6f2bf69913f6bf47a6ae722c9640a311
-
Size
46KB
-
Sample
240122-j5798scda9
-
MD5
6f2bf69913f6bf47a6ae722c9640a311
-
SHA1
5aa0c1acc2c56f283a9694f4953f6085f0b0059d
-
SHA256
8920797352a55d0413ab4642e7e2dcd049d702678f6870f6f58ac64e814e5720
-
SHA512
0721b0c5ad0ce0049609da9f59359fb5d895005342f87697683c9ffbb63213b125c8c81f55dfef50b7678b0f52ad3707d8c4cbdfadb64b8136f236bb3a30164c
-
SSDEEP
768:MB9QFE9xTu53yAeC1lNhTTHxAlbL0gUqrvs9kIL4:MBN9A5CAeCRpTHMbL0gU6+ka4
Behavioral task
behavioral1
Sample
6f2bf69913f6bf47a6ae722c9640a311.exe
Resource
win7-20231129-en
Malware Config
Extracted
https://github.com/NGROKC/CTC/raw/main/CTC64.dll
Extracted
https://github.com/NGROKC/CTC/raw/main/CTC86.dll
Targets
-
-
Target
6f2bf69913f6bf47a6ae722c9640a311
-
Size
46KB
-
MD5
6f2bf69913f6bf47a6ae722c9640a311
-
SHA1
5aa0c1acc2c56f283a9694f4953f6085f0b0059d
-
SHA256
8920797352a55d0413ab4642e7e2dcd049d702678f6870f6f58ac64e814e5720
-
SHA512
0721b0c5ad0ce0049609da9f59359fb5d895005342f87697683c9ffbb63213b125c8c81f55dfef50b7678b0f52ad3707d8c4cbdfadb64b8136f236bb3a30164c
-
SSDEEP
768:MB9QFE9xTu53yAeC1lNhTTHxAlbL0gUqrvs9kIL4:MBN9A5CAeCRpTHMbL0gU6+ka4
-
r77 rootkit payload
Detects the payload of the r77 rootkit.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-