Resubmissions
12-04-2024 14:14
240412-rj2vbseb3s 1012-04-2024 14:03
240412-rcplesea5x 1012-04-2024 14:02
240412-rcljrsea5v 1012-04-2024 14:02
240412-rcgwksah98 1012-04-2024 14:02
240412-rcf92sea5s 812-04-2024 14:02
240412-rcfzaaah97 1009-04-2024 06:51
240409-hmh2ysgg99 809-04-2024 06:50
240409-hmbb4sgg95 809-04-2024 06:50
240409-hl3pzagg85 1009-04-2024 06:50
240409-hlwxesgg79 7General
-
Target
a1480e23bd2a89b188fb01138ef2f54130f2dc41ce85ff9319ab7f15471b0011
-
Size
1.9MB
-
Sample
240409-hmbb4sgg95
-
MD5
151e9ec4f0355d2f131b871671bd5e20
-
SHA1
50992f712b281db70518e6d404084e26dcd98b98
-
SHA256
a1480e23bd2a89b188fb01138ef2f54130f2dc41ce85ff9319ab7f15471b0011
-
SHA512
18a2fa6e9c97281328de819126dccb6cc8576e11ea11a8faba629da58e724040427c7d941ce0f935948195c30da6d60a6873d7e3e9613eba7df42bde1a3aba1f
-
SSDEEP
49152:v1r2g+mLqqeaVjSeluJsslFHfjeKgHEaVjsKHzG:drz+OqjXeluJxlFHf6zHj
Static task
static1
Behavioral task
behavioral1
Sample
a1480e23bd2a89b188fb01138ef2f54130f2dc41ce85ff9319ab7f15471b0011.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a1480e23bd2a89b188fb01138ef2f54130f2dc41ce85ff9319ab7f15471b0011.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
a1480e23bd2a89b188fb01138ef2f54130f2dc41ce85ff9319ab7f15471b0011.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
a1480e23bd2a89b188fb01138ef2f54130f2dc41ce85ff9319ab7f15471b0011.exe
Resource
win11-20240214-en
Malware Config
Targets
-
-
Target
a1480e23bd2a89b188fb01138ef2f54130f2dc41ce85ff9319ab7f15471b0011
-
Size
1.9MB
-
MD5
151e9ec4f0355d2f131b871671bd5e20
-
SHA1
50992f712b281db70518e6d404084e26dcd98b98
-
SHA256
a1480e23bd2a89b188fb01138ef2f54130f2dc41ce85ff9319ab7f15471b0011
-
SHA512
18a2fa6e9c97281328de819126dccb6cc8576e11ea11a8faba629da58e724040427c7d941ce0f935948195c30da6d60a6873d7e3e9613eba7df42bde1a3aba1f
-
SSDEEP
49152:v1r2g+mLqqeaVjSeluJsslFHfjeKgHEaVjsKHzG:drz+OqjXeluJxlFHf6zHj
Score8/10-
Contacts a large (826) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Adds Run key to start application
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-