General
-
Target
2a472151e138dfa15eac967d57cddccc060d74307b05dae9a96e45da6037472d
-
Size
1.5MB
-
Sample
240326-w7xyhaha74
-
MD5
f29a76bc3fddea2902278a41562b450f
-
SHA1
55ada8dcf9f24b2337c6f9365dfd096779f3fe02
-
SHA256
2a472151e138dfa15eac967d57cddccc060d74307b05dae9a96e45da6037472d
-
SHA512
d033129d35f33bdcb7c54829d0b578d25f0dd422ff477b5e66cab1f902e6aca97314f2c36ff6312c49bc28fe2d8b9c62a8397705612313676b90e5e895a309f5
-
SSDEEP
24576:dbCj2sObHtqQ4QqH0XlE654b4fX3fo8wBgNcW:dbCjPKNqQqH0XSucY
Static task
static1
Behavioral task
behavioral1
Sample
2a472151e138dfa15eac967d57cddccc060d74307b05dae9a96e45da6037472d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2a472151e138dfa15eac967d57cddccc060d74307b05dae9a96e45da6037472d.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2a472151e138dfa15eac967d57cddccc060d74307b05dae9a96e45da6037472d
-
Size
1.5MB
-
MD5
f29a76bc3fddea2902278a41562b450f
-
SHA1
55ada8dcf9f24b2337c6f9365dfd096779f3fe02
-
SHA256
2a472151e138dfa15eac967d57cddccc060d74307b05dae9a96e45da6037472d
-
SHA512
d033129d35f33bdcb7c54829d0b578d25f0dd422ff477b5e66cab1f902e6aca97314f2c36ff6312c49bc28fe2d8b9c62a8397705612313676b90e5e895a309f5
-
SSDEEP
24576:dbCj2sObHtqQ4QqH0XlE654b4fX3fo8wBgNcW:dbCjPKNqQqH0XSucY
Score10/10-
Detects executables containing SQL queries to confidential data stores. Observed in infostealers
-
UPX dump on OEP (original entry point)
-
Executes dropped EXE
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-