General
-
Target
4307ea6dc3759c609a950c11763ebe3e
-
Size
209KB
-
Sample
240410-dp1bssfg91
-
MD5
4307ea6dc3759c609a950c11763ebe3e
-
SHA1
dbfe522524e2157b62939e11fba0caea4b5758eb
-
SHA256
7582fd4ed2e0b92d254962953083d90b3324d41a3a81ff30f146af4b3ae4e442
-
SHA512
2afc23f09d5369fb036b8f8e831019ba6dd309d49662d9a8e85322bdd9d1c33e349454f2ba86621b01469efe3175ed9d38612691e34d6862f98d469281ca19a9
-
SSDEEP
6144:YDnLgI91y1UkT57iJz/DpURWPSvHuUiYphu1U6:cnLh9yn52rpUR5vHuRYpM+6
Behavioral task
behavioral1
Sample
4307ea6dc3759c609a950c11763ebe3e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4307ea6dc3759c609a950c11763ebe3e.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
4307ea6dc3759c609a950c11763ebe3e.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
systembc
yan0212.com:4039
yan0212.net:4039
Targets
-
-
Target
4307ea6dc3759c609a950c11763ebe3e
-
Size
209KB
-
MD5
4307ea6dc3759c609a950c11763ebe3e
-
SHA1
dbfe522524e2157b62939e11fba0caea4b5758eb
-
SHA256
7582fd4ed2e0b92d254962953083d90b3324d41a3a81ff30f146af4b3ae4e442
-
SHA512
2afc23f09d5369fb036b8f8e831019ba6dd309d49662d9a8e85322bdd9d1c33e349454f2ba86621b01469efe3175ed9d38612691e34d6862f98d469281ca19a9
-
SSDEEP
6144:YDnLgI91y1UkT57iJz/DpURWPSvHuUiYphu1U6:cnLh9yn52rpUR5vHuRYpM+6
-
Executes dropped EXE
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Uses Tor communications
Malware can proxy its traffic through Tor for more anonymity.
-