General
-
Target
Dev_Solution_V1.zip
-
Size
17.5MB
-
Sample
240126-srsgashhgr
-
MD5
ebe3933c1b208e123c1abe4fc53c5433
-
SHA1
a18bd85add1736f8779e9d2b36147d667bf7e627
-
SHA256
a5ff15aac4d426aaa68e22be303fbf693f6ad173623d4e7e4d3a10d7ab909fe1
-
SHA512
1a5f2ca914f6521d5f53d65a8ed4ed46a064cc68c09b23cbd7e620b41e59ec312587dcbd3fe5d0a6a6d0cc52ded349e66490e07d15e42f4b3d367ee65cd8eacb
-
SSDEEP
393216:+HapXv1xhtqnSTRy2HUSb3g9aWjfApC+q7kl52Bk+:+6pf1x7USsY63A9+
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win10-20231215-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win11-20231215-en
Behavioral task
behavioral3
Sample
main.pyc
Resource
win10-20231220-en
Behavioral task
behavioral4
Sample
main.pyc
Resource
win11-20231215-en
Malware Config
Targets
-
-
Target
Setup.exe
-
Size
17.7MB
-
MD5
9ddb68a9bc7bd5eeb9e22a454467d572
-
SHA1
12ff0bb7b8e7f45ac1824eafef3e37faa6269922
-
SHA256
79b1fe3e05b8618492329f126a6b4a0747d3270fcd996ece3dbf4d695285e470
-
SHA512
88530501cc2f169c00ceca618390dcf6e09e879bd22a069e263420bdef606574db6297c68c7c0aa8f7c30c1d7b543939c9ca6d6c3fc6afdcfacf0d09db60a4f5
-
SSDEEP
393216:6qPnLFXlreQpDOETgsvfGapgmRvEaiOpjIq:PPLFXNeQoEthmGH
Score7/10-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
main.pyc
-
Size
7KB
-
MD5
9763305b30f8d7b8b344be9f01b90434
-
SHA1
74828e164504d171c5c4c86cc635cf077d602595
-
SHA256
5ce5237b6c01d233568bb2813c912c11e06ceeea6bcf5c89244855a686f3821d
-
SHA512
fa8c9d5c8075ee9de2464357275ecadc4856fa5612c53572eb2fe30e7a606a50455ae98231ad33d7c07ad62b05ccf262daeb31eed31a68107eb132209c255fa7
-
SSDEEP
192:w8WoCz4yAID80SXZWdXwxY57s0xn6G8YJhwGZt8XMdw0sAinw:zR3uAZWuxYFx58c20oP0Piw
Score3/10 -