General
-
Target
a733221129b17200bb1e364275116016429904433fea87fab0a3f95433676362
-
Size
3.8MB
-
Sample
240229-nzj3nsge43
-
MD5
dc04de40710a567639589c5688a6b5d9
-
SHA1
9bd0e4360fe361962ebddb1d9b6451d99039f3c1
-
SHA256
a733221129b17200bb1e364275116016429904433fea87fab0a3f95433676362
-
SHA512
66c242aa1be30e47d3c7c9f3f15b9c042eab845aaa36f423c42a3683308aab294821bb8b61e7f5ed6d9fb0423350c659924bcd4610bebbb046e84b74ecb3c7d6
-
SSDEEP
98304:d77Pmq33rE/JDLPWZADUGer7B6iY74M/DmlwXVZ4FB:5+R/eZADUXR
Behavioral task
behavioral1
Sample
a733221129b17200bb1e364275116016429904433fea87fab0a3f95433676362.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
a733221129b17200bb1e364275116016429904433fea87fab0a3f95433676362.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
bitrat
1.38
6.tcp.ngrok.io:13541
-
communication_password
92bfd6a529206b093c6840483e63902a
-
install_dir
Google
-
install_file
svchost.exe
-
tor_process
tor
Targets
-
-
Target
a733221129b17200bb1e364275116016429904433fea87fab0a3f95433676362
-
Size
3.8MB
-
MD5
dc04de40710a567639589c5688a6b5d9
-
SHA1
9bd0e4360fe361962ebddb1d9b6451d99039f3c1
-
SHA256
a733221129b17200bb1e364275116016429904433fea87fab0a3f95433676362
-
SHA512
66c242aa1be30e47d3c7c9f3f15b9c042eab845aaa36f423c42a3683308aab294821bb8b61e7f5ed6d9fb0423350c659924bcd4610bebbb046e84b74ecb3c7d6
-
SSDEEP
98304:d77Pmq33rE/JDLPWZADUGer7B6iY74M/DmlwXVZ4FB:5+R/eZADUXR
Score10/10-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-