Analysis

  • max time kernel
    141s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09/03/2024, 23:31 UTC

General

  • Target

    bd17a6b8b4ad6d0c26691b57a0ef8671.exe

  • Size

    18KB

  • MD5

    bd17a6b8b4ad6d0c26691b57a0ef8671

  • SHA1

    cd3d860ae2575f1946ffed8d24ac0318827708f5

  • SHA256

    aaf259ac7938019c664f3dff4e78308d86cfb79453eda418d8d88384c0d836f9

  • SHA512

    ab857fbd9acc40b837c7f75f4e4d7e384762231330e8adf587cbd582b44ff37caeef0b00ff9533f614b698cbc30dc43ce5c543dffb1a49f51c0fa616ee026b65

  • SSDEEP

    384:lNPajBUGTR/p9wjI0g4IYUQzVqgFSQwtZHZ9xwV8Yrv1b7:lNyqGTR/pOjFFIY9z/0rgr5

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd17a6b8b4ad6d0c26691b57a0ef8671.exe
    "C:\Users\Admin\AppData\Local\Temp\bd17a6b8b4ad6d0c26691b57a0ef8671.exe"
    1⤵
      PID:2252

    Network

    • flag-us
      DNS
      mqeqoggm.cz.cc
      bd17a6b8b4ad6d0c26691b57a0ef8671.exe
      Remote address:
      8.8.8.8:53
      Request
      mqeqoggm.cz.cc
      IN A
      Response
    • flag-us
      DNS
      mqeqoggm.cz.cc
      bd17a6b8b4ad6d0c26691b57a0ef8671.exe
      Remote address:
      8.8.8.8:53
      Request
      mqeqoggm.cz.cc
      IN A
      Response
    • flag-us
      DNS
      mqeqoggm.cz.cc
      bd17a6b8b4ad6d0c26691b57a0ef8671.exe
      Remote address:
      8.8.8.8:53
      Request
      mqeqoggm.cz.cc
      IN A
      Response
    • flag-us
      DNS
      mqeqoggm.cz.cc
      bd17a6b8b4ad6d0c26691b57a0ef8671.exe
      Remote address:
      8.8.8.8:53
      Request
      mqeqoggm.cz.cc
      IN A
    No results found
    • 8.8.8.8:53
      mqeqoggm.cz.cc
      dns
      bd17a6b8b4ad6d0c26691b57a0ef8671.exe
      240 B
      180 B
      4
      3

      DNS Request

      mqeqoggm.cz.cc

      DNS Request

      mqeqoggm.cz.cc

      DNS Request

      mqeqoggm.cz.cc

      DNS Request

      mqeqoggm.cz.cc

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2252-0-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/2252-2-0x0000000000260000-0x0000000000261000-memory.dmp

      Filesize

      4KB

    • memory/2252-1-0x0000000000250000-0x0000000000252000-memory.dmp

      Filesize

      8KB

    • memory/2252-3-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/2252-4-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.