General
-
Target
2d3ba7dd14b9a579b2626fa5baee19bd
-
Size
209KB
-
Sample
240410-flcsfadc82
-
MD5
2d3ba7dd14b9a579b2626fa5baee19bd
-
SHA1
dd365103583cfb3c10b73efc6592f8b80c1d75e0
-
SHA256
42a191ee4f9593db8f514cce85ad8b9d6533bc71983a9529e7a5d68764d21679
-
SHA512
29efd1035df73572efea0d96017772481b9858855c12d1bb96fc6a4ccd49443a4bb0d1bd86c69dda4218f04e8855ec37c4515157b75a240a530792232c4f03c0
-
SSDEEP
6144:YDnLgI91y1UkT57iJz/DpURWPSvHuUiYphu1UY:cnLh9yn52rpUR5vHuRYpM+Y
Behavioral task
behavioral1
Sample
2d3ba7dd14b9a579b2626fa5baee19bd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2d3ba7dd14b9a579b2626fa5baee19bd.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
2d3ba7dd14b9a579b2626fa5baee19bd.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
systembc
yan0212.com:4039
yan0212.net:4039
Targets
-
-
Target
2d3ba7dd14b9a579b2626fa5baee19bd
-
Size
209KB
-
MD5
2d3ba7dd14b9a579b2626fa5baee19bd
-
SHA1
dd365103583cfb3c10b73efc6592f8b80c1d75e0
-
SHA256
42a191ee4f9593db8f514cce85ad8b9d6533bc71983a9529e7a5d68764d21679
-
SHA512
29efd1035df73572efea0d96017772481b9858855c12d1bb96fc6a4ccd49443a4bb0d1bd86c69dda4218f04e8855ec37c4515157b75a240a530792232c4f03c0
-
SSDEEP
6144:YDnLgI91y1UkT57iJz/DpURWPSvHuUiYphu1UY:cnLh9yn52rpUR5vHuRYpM+Y
-
Contacts a large (710) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Uses Tor communications
Malware can proxy its traffic through Tor for more anonymity.
-