General
-
Target
046e029c41ac8987649a05e98db75a462e6d42f5f32e871f907036d23ec2d701
-
Size
212KB
-
Sample
240416-m8lr7agh22
-
MD5
3645d634e5976620737eaffe304d30a7
-
SHA1
6b8f47c29a2710a5dee91f61095b71cd3bb65660
-
SHA256
046e029c41ac8987649a05e98db75a462e6d42f5f32e871f907036d23ec2d701
-
SHA512
00014b0a0c892718ea66630137639305da6294636598a90dcafcb7d71869bcd5912c8ee531d9265682321859da8ce4466da8a41347ecab069f182b4ae421862d
-
SSDEEP
6144:YDnLgI91y1UkT57iJz/DpURWPSvHuUiYphu1U:cnLh9yn52rpUR5vHuRYpM+
Behavioral task
behavioral1
Sample
046e029c41ac8987649a05e98db75a462e6d42f5f32e871f907036d23ec2d701.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
046e029c41ac8987649a05e98db75a462e6d42f5f32e871f907036d23ec2d701.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
046e029c41ac8987649a05e98db75a462e6d42f5f32e871f907036d23ec2d701.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
systembc
yan0212.com:4039
yan0212.net:4039
Targets
-
-
Target
046e029c41ac8987649a05e98db75a462e6d42f5f32e871f907036d23ec2d701
-
Size
212KB
-
MD5
3645d634e5976620737eaffe304d30a7
-
SHA1
6b8f47c29a2710a5dee91f61095b71cd3bb65660
-
SHA256
046e029c41ac8987649a05e98db75a462e6d42f5f32e871f907036d23ec2d701
-
SHA512
00014b0a0c892718ea66630137639305da6294636598a90dcafcb7d71869bcd5912c8ee531d9265682321859da8ce4466da8a41347ecab069f182b4ae421862d
-
SSDEEP
6144:YDnLgI91y1UkT57iJz/DpURWPSvHuUiYphu1U:cnLh9yn52rpUR5vHuRYpM+
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Uses Tor communications
Malware can proxy its traffic through Tor for more anonymity.
-