General
-
Target
470e11682abb522051bfe838db8c2f239ab4efca23c8c5956cedb3282e12f94e.exe.compressed
-
Size
160KB
-
Sample
240128-2z7evsccd6
-
MD5
783bfc4ed097aa2d936b96478e92edca
-
SHA1
85e267feb6ad0d0597717cafefd9016d52aa6a58
-
SHA256
2309ffb7ca99f97a45d65f5e1ee15775021b5091c38431d5313d19828865a26e
-
SHA512
8b73cd79d0f9d8ae0102f1f1ddc6f97738212f97627503160d3e09743b9cfd7ac5e90f9da94dd0ce1961da12e0702518fadb0c39f6984cbfcef41e8acafcb0fe
-
SSDEEP
3072:0FB3O3IRORghwODMJlz1dxoOXwupfbvsS4LA4BUAvbi3pOwjwzzy:SBZcIDqvysbpftUA4bWgwee
Behavioral task
behavioral1
Sample
470e11682abb522051bfe838db8c2f239ab4efca23c8c5956cedb3282e12f94e.exe
Resource
win7-20231215-en
Malware Config
Targets
-
-
Target
470e11682abb522051bfe838db8c2f239ab4efca23c8c5956cedb3282e12f94e.exe.compressed
-
Size
160KB
-
MD5
783bfc4ed097aa2d936b96478e92edca
-
SHA1
85e267feb6ad0d0597717cafefd9016d52aa6a58
-
SHA256
2309ffb7ca99f97a45d65f5e1ee15775021b5091c38431d5313d19828865a26e
-
SHA512
8b73cd79d0f9d8ae0102f1f1ddc6f97738212f97627503160d3e09743b9cfd7ac5e90f9da94dd0ce1961da12e0702518fadb0c39f6984cbfcef41e8acafcb0fe
-
SSDEEP
3072:0FB3O3IRORghwODMJlz1dxoOXwupfbvsS4LA4BUAvbi3pOwjwzzy:SBZcIDqvysbpftUA4bWgwee
-
Detects command variations typically used by ransomware
-
UPX dump on OEP (original entry point)
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Drops desktop.ini file(s)
-