Resubmissions
17/04/2024, 14:25
240417-rq95aabg57 717/04/2024, 14:24
240417-rq63madc5t 717/04/2024, 14:24
240417-rq3p7sbg46 717/04/2024, 14:24
240417-rq24nsdc4w 717/04/2024, 14:24
240417-rq2g5sbg44 715/04/2024, 13:54
240415-q7j4raab8z 715/04/2024, 13:53
240415-q7bglsfh88 715/04/2024, 13:53
240415-q682gsab8s 715/04/2024, 13:53
240415-q61p4sfh83 715/04/2024, 13:53
240415-q6z4ksab7w 7General
-
Target
08089429ee4231d39dd0f2c970dca60e09a72e6c003f480f2dad76b032fdc1cf
-
Size
1.9MB
-
Sample
240415-q61p4sfh83
-
MD5
0b559ca054356534e07322d4cd00a351
-
SHA1
e5be9a86c3da0a25a15bad5b06390cae4f71610a
-
SHA256
08089429ee4231d39dd0f2c970dca60e09a72e6c003f480f2dad76b032fdc1cf
-
SHA512
82438431578bd37381632f2e330c600d17344a16dcf63b0df49887c964ec7565ee840fc2f98405982eefb21f6abaa111562b8950033fad389345b5069bd5e047
-
SSDEEP
49152:POwglWgEBHGKCSbMCAvxDM82UCYaLb+NLytJD8W4EfzaFb:POTlWHtAvO82U0LKNeEuz
Static task
static1
Behavioral task
behavioral1
Sample
08089429ee4231d39dd0f2c970dca60e09a72e6c003f480f2dad76b032fdc1cf.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
08089429ee4231d39dd0f2c970dca60e09a72e6c003f480f2dad76b032fdc1cf.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
08089429ee4231d39dd0f2c970dca60e09a72e6c003f480f2dad76b032fdc1cf.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral4
Sample
08089429ee4231d39dd0f2c970dca60e09a72e6c003f480f2dad76b032fdc1cf.exe
Resource
win11-20240412-en
Malware Config
Targets
-
-
Target
08089429ee4231d39dd0f2c970dca60e09a72e6c003f480f2dad76b032fdc1cf
-
Size
1.9MB
-
MD5
0b559ca054356534e07322d4cd00a351
-
SHA1
e5be9a86c3da0a25a15bad5b06390cae4f71610a
-
SHA256
08089429ee4231d39dd0f2c970dca60e09a72e6c003f480f2dad76b032fdc1cf
-
SHA512
82438431578bd37381632f2e330c600d17344a16dcf63b0df49887c964ec7565ee840fc2f98405982eefb21f6abaa111562b8950033fad389345b5069bd5e047
-
SSDEEP
49152:POwglWgEBHGKCSbMCAvxDM82UCYaLb+NLytJD8W4EfzaFb:POTlWHtAvO82U0LKNeEuz
Score7/10-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-