General
-
Target
eed65a59ffc55619d3c144643c7bca78
-
Size
209KB
-
Sample
240410-dsbgvafh3w
-
MD5
eed65a59ffc55619d3c144643c7bca78
-
SHA1
85f049718c98b19823674e880b45cc66fc030206
-
SHA256
804b4844251783c944b1f731776d6588e83e5965cc0cf08bd22de57cb37134d0
-
SHA512
f744d7e69417b13d1faab77b300858fc2e01f18aa400499e7341466d291997f5f54503aa4371838f36b453502619da297f87269c190375dcdbf4084ffc1d34e4
-
SSDEEP
6144:YDnLgI91y1UkT57iJz/DpURWPSvHuUiYphu1UU:cnLh9yn52rpUR5vHuRYpM+U
Behavioral task
behavioral1
Sample
eed65a59ffc55619d3c144643c7bca78.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eed65a59ffc55619d3c144643c7bca78.exe
Resource
win10-20240319-en
Behavioral task
behavioral3
Sample
eed65a59ffc55619d3c144643c7bca78.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
systembc
yan0212.com:4039
yan0212.net:4039
Targets
-
-
Target
eed65a59ffc55619d3c144643c7bca78
-
Size
209KB
-
MD5
eed65a59ffc55619d3c144643c7bca78
-
SHA1
85f049718c98b19823674e880b45cc66fc030206
-
SHA256
804b4844251783c944b1f731776d6588e83e5965cc0cf08bd22de57cb37134d0
-
SHA512
f744d7e69417b13d1faab77b300858fc2e01f18aa400499e7341466d291997f5f54503aa4371838f36b453502619da297f87269c190375dcdbf4084ffc1d34e4
-
SSDEEP
6144:YDnLgI91y1UkT57iJz/DpURWPSvHuUiYphu1UU:cnLh9yn52rpUR5vHuRYpM+U
-
Contacts a large (754) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Uses Tor communications
Malware can proxy its traffic through Tor for more anonymity.
-