Resubmissions
15/04/2024, 11:40
240415-ns6yvsdd95 1015/04/2024, 11:40
240415-ns6cbsfg6t 1015/04/2024, 11:40
240415-ns4thafg6s 1015/04/2024, 11:40
240415-ns37zadd92 1015/04/2024, 11:40
240415-ns3w7sdd89 1010/04/2024, 05:04
240410-fqkzlsge6x 1010/04/2024, 05:04
240410-fqkc3sdd33 1010/04/2024, 05:04
240410-fqjrjsge6w 1010/04/2024, 05:04
240410-fqh51sge6v 1002/04/2024, 15:12
240402-slhpxadh7t 10General
-
Target
8692ca84b76d38ec5c260265413e4ca2.exe
-
Size
166KB
-
Sample
240415-ns6yvsdd95
-
MD5
8692ca84b76d38ec5c260265413e4ca2
-
SHA1
04ae6c5ee39ae1f56bae5e91ecaafb7f7cbee5c7
-
SHA256
000ce16aa593d3de6ee74dc23d0ef231a77383c7545990d32c47f038314d0051
-
SHA512
d4af4f9597d7266a5b9962ceb89a10cc50b7c426fc49682ac50b4c21ae08cf78d015f1ce5cd21b9f54a5591d475ced11195b45bae69ac918a64c910e434a608d
-
SSDEEP
1536:hy20DImKwSz/7QuIBOIpsqDBYyP3ZVltEOGn5XZg65Wr/E+DSl55J3zQuk0B55ho:hsc5PqfOuPXEHz5WrMJ55J3zXLB55cC
Static task
static1
Behavioral task
behavioral1
Sample
8692ca84b76d38ec5c260265413e4ca2.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
8692ca84b76d38ec5c260265413e4ca2.exe
Resource
win7-20231129-en
Behavioral task
behavioral3
Sample
8692ca84b76d38ec5c260265413e4ca2.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
8692ca84b76d38ec5c260265413e4ca2.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
systembc
knock0909.monster:4035
knock0909.xyz:4035
Targets
-
-
Target
8692ca84b76d38ec5c260265413e4ca2.exe
-
Size
166KB
-
MD5
8692ca84b76d38ec5c260265413e4ca2
-
SHA1
04ae6c5ee39ae1f56bae5e91ecaafb7f7cbee5c7
-
SHA256
000ce16aa593d3de6ee74dc23d0ef231a77383c7545990d32c47f038314d0051
-
SHA512
d4af4f9597d7266a5b9962ceb89a10cc50b7c426fc49682ac50b4c21ae08cf78d015f1ce5cd21b9f54a5591d475ced11195b45bae69ac918a64c910e434a608d
-
SSDEEP
1536:hy20DImKwSz/7QuIBOIpsqDBYyP3ZVltEOGn5XZg65Wr/E+DSl55J3zQuk0B55ho:hsc5PqfOuPXEHz5WrMJ55J3zXLB55cC
-
Contacts a large (868) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Uses Tor communications
Malware can proxy its traffic through Tor for more anonymity.
-