Resubmissions
12-04-2024 13:28
240412-qq3vjadh2z 1012-04-2024 13:27
240412-qqg8tsag65 1012-04-2024 13:27
240412-qqgmasag64 1012-04-2024 13:27
240412-qqgbjaag62 812-04-2024 13:27
240412-qqdkmsdg9z 1009-04-2024 04:02
240409-el73xahe9s 1009-04-2024 04:01
240409-elk85she71 1009-04-2024 04:01
240409-eldjasea62 1009-04-2024 04:01
240409-ek8m2she6w 1014-01-2024 01:31
240114-bxveeaaeh9 7General
-
Target
456dad1f25fefa40f70c152a706316bc.bin
-
Size
1.8MB
-
Sample
240412-qqgbjaag62
-
MD5
e663743f124514279013d11584a83c3b
-
SHA1
e277fa235b642177a3063f0ea80f6ee11b54b870
-
SHA256
2854ef18b052f7b19e9ef1f006508e87f1ee3ed2592eef1aa9bb7d941852c3ca
-
SHA512
1b6cb7251108382c768976dc3836a3d248bbc65186171877f5023a0c34563e31dc141e6b025c350ce109233f19aa96f3d4f7752e98b704c1f407099e9da3aa7e
-
SSDEEP
49152:9XtCJwmA2uHowv1YvjBCD2s7KtDp+swshg0hVFe:9XtCJwmAVPilSj7KSbshg0hbe
Static task
static1
Behavioral task
behavioral1
Sample
67d39d9194a79f2f1aa0585b8cbc3a38a651964d72469e27692a62038ae3b412.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
67d39d9194a79f2f1aa0585b8cbc3a38a651964d72469e27692a62038ae3b412.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
67d39d9194a79f2f1aa0585b8cbc3a38a651964d72469e27692a62038ae3b412.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
67d39d9194a79f2f1aa0585b8cbc3a38a651964d72469e27692a62038ae3b412.exe
Resource
win11-20240221-en
Malware Config
Targets
-
-
Target
67d39d9194a79f2f1aa0585b8cbc3a38a651964d72469e27692a62038ae3b412.exe
-
Size
1.9MB
-
MD5
456dad1f25fefa40f70c152a706316bc
-
SHA1
c741c8e32f1510c175c6d518401f3cf4d4f6d8da
-
SHA256
67d39d9194a79f2f1aa0585b8cbc3a38a651964d72469e27692a62038ae3b412
-
SHA512
e51d7f476d0b92cef1d2bc012f9436aead835642381241ba6d2dd149251a3ccc09b28e0be160e1e8f62aa6da79b935a6016700e31605895042c1fe61b4ca876f
-
SSDEEP
49152:F/MBkUJZCcifDFu/6nEkqg1kka+dW0hWk9NQXNF+9uop3biUIgYcoP:FEBkmZofDFu/6nR6SW+woVBlR
Score8/10-
Contacts a large (1563) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Adds Run key to start application
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-