Resubmissions
13-04-2024 10:00
240413-l1wfzsff9v 913-04-2024 10:00
240413-l1v58acg25 713-04-2024 10:00
240413-l1nq5scg23 813-04-2024 09:59
240413-l1gylacf99 713-04-2024 09:59
240413-l1gb3acf98 709-04-2024 08:20
240409-j8er4aad99 809-04-2024 08:20
240409-j8egbsad98 809-04-2024 08:20
240409-j8dvssad97 1009-04-2024 08:19
240409-j8cyhadg4s 1026-02-2024 04:47
240226-feyrbsdb58 8General
-
Target
40dc1ae099f2278650c0aa599ba00f659a87996208133d6a64b0cc5cbb5fe990
-
Size
1.8MB
-
Sample
240413-l1nq5scg23
-
MD5
147f5f5bbc80b2ad753993e15f3f32c2
-
SHA1
16d73b4abeef12cf76414338901eb7bbef46775f
-
SHA256
40dc1ae099f2278650c0aa599ba00f659a87996208133d6a64b0cc5cbb5fe990
-
SHA512
9c43aaa68161ef04c60e3f64c3fd54426dfd387f0013f009f3da94d45f19e514cd41de7b95865c47f55e5800222fd74736659138bb96406aa37f9cdc8e5799b6
-
SSDEEP
49152:L0F7w+ANy7moCOmY9x5VlLdf0w26/biK:IaXsCc9nmwfOK
Static task
static1
Behavioral task
behavioral1
Sample
40dc1ae099f2278650c0aa599ba00f659a87996208133d6a64b0cc5cbb5fe990.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
40dc1ae099f2278650c0aa599ba00f659a87996208133d6a64b0cc5cbb5fe990.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
40dc1ae099f2278650c0aa599ba00f659a87996208133d6a64b0cc5cbb5fe990.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral4
Sample
40dc1ae099f2278650c0aa599ba00f659a87996208133d6a64b0cc5cbb5fe990.exe
Resource
win11-20240412-en
Malware Config
Targets
-
-
Target
40dc1ae099f2278650c0aa599ba00f659a87996208133d6a64b0cc5cbb5fe990
-
Size
1.8MB
-
MD5
147f5f5bbc80b2ad753993e15f3f32c2
-
SHA1
16d73b4abeef12cf76414338901eb7bbef46775f
-
SHA256
40dc1ae099f2278650c0aa599ba00f659a87996208133d6a64b0cc5cbb5fe990
-
SHA512
9c43aaa68161ef04c60e3f64c3fd54426dfd387f0013f009f3da94d45f19e514cd41de7b95865c47f55e5800222fd74736659138bb96406aa37f9cdc8e5799b6
-
SSDEEP
49152:L0F7w+ANy7moCOmY9x5VlLdf0w26/biK:IaXsCc9nmwfOK
Score8/10-
Contacts a large (870) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Adds Run key to start application
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-