General
-
Target
1428-1-0x0000000000310000-0x0000000000328000-memory.dmp
-
Size
96KB
-
Sample
240222-pr4b1she56
-
MD5
358665791ab6029cae9af9febba95685
-
SHA1
db9acafee39e12aa51b4147dfc2a750c29c17eb6
-
SHA256
9c6679cf48240afa4e75051042c10479f0e0dabb2ca00403ce3e0e5da36bec02
-
SHA512
548d93332c2f07323eb6ebd05c75817c3b24f8167c06fe6d332079b405af8cbf700c6eb530a655c618a2244bfd2486548e1ef18cf5137e90e8701e87dbe5b7db
-
SSDEEP
1536:xnNnlUZo2RwxFqd5AxgWP415DTtSix8d1CcoyLNJyX7DwN:NJlUCk8Fy5tvvtTxOdRCDe
Behavioral task
behavioral1
Sample
1428-1-0x0000000000310000-0x0000000000328000-memory.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
1428-1-0x0000000000310000-0x0000000000328000-memory.exe
Resource
win10v2004-20240221-en
Malware Config
Extracted
pikabot
141.95.106.106
104.129.55.106
104.129.55.105
23.226.138.161
145.239.135.24
85.239.243.155
23.226.138.143
57.128.165.176
178.18.246.136
Targets
-
-
Target
1428-1-0x0000000000310000-0x0000000000328000-memory.dmp
-
Size
96KB
-
MD5
358665791ab6029cae9af9febba95685
-
SHA1
db9acafee39e12aa51b4147dfc2a750c29c17eb6
-
SHA256
9c6679cf48240afa4e75051042c10479f0e0dabb2ca00403ce3e0e5da36bec02
-
SHA512
548d93332c2f07323eb6ebd05c75817c3b24f8167c06fe6d332079b405af8cbf700c6eb530a655c618a2244bfd2486548e1ef18cf5137e90e8701e87dbe5b7db
-
SSDEEP
1536:xnNnlUZo2RwxFqd5AxgWP415DTtSix8d1CcoyLNJyX7DwN:NJlUCk8Fy5tvvtTxOdRCDe
Score3/10 -