Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 19:22
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c6ad0730e5a6e5f2374fb757eba8c01c.exe
Resource
win7-20240215-en
3 signatures
150 seconds
General
-
Target
c6ad0730e5a6e5f2374fb757eba8c01c.exe
-
Size
4.6MB
-
MD5
c6ad0730e5a6e5f2374fb757eba8c01c
-
SHA1
43c1e55be864b03aa2f3497c20b34c7a831f2198
-
SHA256
11e3c40d436dacc3b3eb126316294e2be98771128a5c7ebe86ffce0a8134a81a
-
SHA512
939df6c607b09d17e82b3f019cdca3d5e135280ddd7560ee215f55cc39656d64ec2f87224bfd7796d7254b25211348153b928617669c9a5e419936565bee6611
-
SSDEEP
98304:JOga6v9KHy9rCmcpZp8iG6ZPEW6PImVkn22rvHvBSV5jMeLbQ2kxIa4:s36Wygjx8ix8LXud/v0w2k6/
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 12 api.ipify.org -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1540 c6ad0730e5a6e5f2374fb757eba8c01c.exe