General
-
Target
8a531865aa5785bb7b20574bb347744a5d83cf8719c6809217402b4fa5fbde91
-
Size
1.9MB
-
Sample
240409-l4nwbacc65
-
MD5
d5057eda9b4251e0e52fb2d8524cfa57
-
SHA1
327f6d72563fdfb1ab206ac9a3b2d4c770d066f5
-
SHA256
8a531865aa5785bb7b20574bb347744a5d83cf8719c6809217402b4fa5fbde91
-
SHA512
24d423aa3d71b12af016c5918940d4984f1640f902dc36adc9a29dd9980baa2210ea250111b052dc9fdc5cdfbea8ece8813494f2d2ccecefa60f224a3d731fb2
-
SSDEEP
24576:OPUnujryKC12iAlGaRctykklEPjJ3QIzs6yBKSolGIUOVPgJAt8EnZapKtpMh6co:9Dr2iAcKcC+N3Bs6ywSz5SSAza88hqx
Static task
static1
Behavioral task
behavioral1
Sample
8a531865aa5785bb7b20574bb347744a5d83cf8719c6809217402b4fa5fbde91.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8a531865aa5785bb7b20574bb347744a5d83cf8719c6809217402b4fa5fbde91.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
8a531865aa5785bb7b20574bb347744a5d83cf8719c6809217402b4fa5fbde91.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
8a531865aa5785bb7b20574bb347744a5d83cf8719c6809217402b4fa5fbde91.exe
Resource
win11-20240221-en
Malware Config
Extracted
Protocol: ftp- Host:
hells-hack.com - Port:
21 - Username:
[email protected] - Password:
12345678910выф
Extracted
Protocol: ftp- Host:
hells-hack.com - Port:
21 - Username:
mr.crazy - Password:
12345678910выф
Extracted
Protocol: ftp- Host:
hells-hack.com - Port:
21 - Username:
admin - Password:
12345678910выф
Extracted
Protocol: ftp- Host:
hells-hack.com - Port:
21 - Username:
hells-hack - Password:
12345678910выф
Targets
-
-
Target
8a531865aa5785bb7b20574bb347744a5d83cf8719c6809217402b4fa5fbde91
-
Size
1.9MB
-
MD5
d5057eda9b4251e0e52fb2d8524cfa57
-
SHA1
327f6d72563fdfb1ab206ac9a3b2d4c770d066f5
-
SHA256
8a531865aa5785bb7b20574bb347744a5d83cf8719c6809217402b4fa5fbde91
-
SHA512
24d423aa3d71b12af016c5918940d4984f1640f902dc36adc9a29dd9980baa2210ea250111b052dc9fdc5cdfbea8ece8813494f2d2ccecefa60f224a3d731fb2
-
SSDEEP
24576:OPUnujryKC12iAlGaRctykklEPjJ3QIzs6yBKSolGIUOVPgJAt8EnZapKtpMh6co:9Dr2iAcKcC+N3Bs6ywSz5SSAza88hqx
Score10/10-
Contacts a large (1568) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Adds Run key to start application
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-