Resubmissions
12-04-2024 13:47
240412-q3nalsdh8v 1012-04-2024 13:47
240412-q3mn3sdh8t 1012-04-2024 13:47
240412-q3mdbadh8s 1012-04-2024 13:47
240412-q3lrsadh71 812-04-2024 13:47
240412-q3lf1sah48 809-04-2024 06:37
240409-hdnwvagf37 1009-04-2024 06:36
240409-hdc5cagf32 1009-04-2024 06:36
240409-hc3nlsgf24 8General
-
Target
518c488150a5d11ad06aeb133ce63696e2f3918d3c6c997f69ae8ebe9c3870e6
-
Size
1.9MB
-
Sample
240409-hc3nlsgf24
-
MD5
86f2f5b1e021249025236f1c3a1935d4
-
SHA1
4d102ec935c274bded67400a90dcd253fd57805f
-
SHA256
518c488150a5d11ad06aeb133ce63696e2f3918d3c6c997f69ae8ebe9c3870e6
-
SHA512
0f239c4ed770b0e03d0d0794cb3be21bcea2bc5fda5ac70ca057b92262f9c5362e98c5f672fc865a52f69c219e188a58e864ced8aa79fd127be92b1299259451
-
SSDEEP
49152:YLEqi8ZJjjHXfcrkSzdthQO9dO/V1skL/cgNPvTsohB:YLH9DcrBT9yVjL/tRrsohB
Static task
static1
Behavioral task
behavioral1
Sample
518c488150a5d11ad06aeb133ce63696e2f3918d3c6c997f69ae8ebe9c3870e6.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
518c488150a5d11ad06aeb133ce63696e2f3918d3c6c997f69ae8ebe9c3870e6.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
518c488150a5d11ad06aeb133ce63696e2f3918d3c6c997f69ae8ebe9c3870e6.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
518c488150a5d11ad06aeb133ce63696e2f3918d3c6c997f69ae8ebe9c3870e6.exe
Resource
win11-20240214-en
Malware Config
Targets
-
-
Target
518c488150a5d11ad06aeb133ce63696e2f3918d3c6c997f69ae8ebe9c3870e6
-
Size
1.9MB
-
MD5
86f2f5b1e021249025236f1c3a1935d4
-
SHA1
4d102ec935c274bded67400a90dcd253fd57805f
-
SHA256
518c488150a5d11ad06aeb133ce63696e2f3918d3c6c997f69ae8ebe9c3870e6
-
SHA512
0f239c4ed770b0e03d0d0794cb3be21bcea2bc5fda5ac70ca057b92262f9c5362e98c5f672fc865a52f69c219e188a58e864ced8aa79fd127be92b1299259451
-
SSDEEP
49152:YLEqi8ZJjjHXfcrkSzdthQO9dO/V1skL/cgNPvTsohB:YLH9DcrBT9yVjL/tRrsohB
Score8/10-
Contacts a large (787) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Adds Run key to start application
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-