General
-
Target
a55da20fb4e6a4a88b2eef5b7c68146c2f33ffca24571a95ee7d29b638aa48f3
-
Size
1.3MB
-
Sample
240417-kp3kgsbg4x
-
MD5
b56f2fa2ff6e06da3932ffa70b8440c5
-
SHA1
9136b20d2fd9d4ea09981df6552f2691f13ab997
-
SHA256
a55da20fb4e6a4a88b2eef5b7c68146c2f33ffca24571a95ee7d29b638aa48f3
-
SHA512
dad969a36e05dfff7c62ec4b74986a2b71f0d7e2d64208e9c0bbbd9cf945c238d82f13bbeb56cf1336fc9078ed10ef0ab6d376546f8e9880f5d94f9004d90ccb
-
SSDEEP
12288:hD0Yxtmgcj3DKjs16MKYIjhy+AC5j6vfNqn:hQYxtmiEEYIjhyQj6vfNqn
Static task
static1
Behavioral task
behavioral1
Sample
a55da20fb4e6a4a88b2eef5b7c68146c2f33ffca24571a95ee7d29b638aa48f3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a55da20fb4e6a4a88b2eef5b7c68146c2f33ffca24571a95ee7d29b638aa48f3.exe
Resource
win7-20231129-en
Behavioral task
behavioral3
Sample
a55da20fb4e6a4a88b2eef5b7c68146c2f33ffca24571a95ee7d29b638aa48f3.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
a55da20fb4e6a4a88b2eef5b7c68146c2f33ffca24571a95ee7d29b638aa48f3.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
a55da20fb4e6a4a88b2eef5b7c68146c2f33ffca24571a95ee7d29b638aa48f3.exe
Resource
win11-20240412-en
Malware Config
Targets
-
-
Target
a55da20fb4e6a4a88b2eef5b7c68146c2f33ffca24571a95ee7d29b638aa48f3
-
Size
1.3MB
-
MD5
b56f2fa2ff6e06da3932ffa70b8440c5
-
SHA1
9136b20d2fd9d4ea09981df6552f2691f13ab997
-
SHA256
a55da20fb4e6a4a88b2eef5b7c68146c2f33ffca24571a95ee7d29b638aa48f3
-
SHA512
dad969a36e05dfff7c62ec4b74986a2b71f0d7e2d64208e9c0bbbd9cf945c238d82f13bbeb56cf1336fc9078ed10ef0ab6d376546f8e9880f5d94f9004d90ccb
-
SSDEEP
12288:hD0Yxtmgcj3DKjs16MKYIjhy+AC5j6vfNqn:hQYxtmiEEYIjhyQj6vfNqn
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Uses Tor communications
Malware can proxy its traffic through Tor for more anonymity.
-