General
-
Target
5cb37592f7d36143707c41a09c92f511323eae1fadfa1dc116d4099e27f11132
-
Size
1.3MB
-
Sample
240417-n1zvhsfd5z
-
MD5
02f1eaa4a9a976453c2edcdf35eb5267
-
SHA1
8dcc6ef3efb3a468457f0eacac4916b4de1a269a
-
SHA256
5cb37592f7d36143707c41a09c92f511323eae1fadfa1dc116d4099e27f11132
-
SHA512
de2454c505d6d45163ab985e16ec57146753d2f521eac9cf6f944604740c408e2ef749a6a0eb04e8cdd5f3fc39ce5327916fa07a6e91f46e4c296bb81e064362
-
SSDEEP
12288:hD0Yxtmgcj3DKjs16MKYIjhy+AC5j6vfNqM:hQYxtmiEEYIjhyQj6vfNqM
Static task
static1
Behavioral task
behavioral1
Sample
5cb37592f7d36143707c41a09c92f511323eae1fadfa1dc116d4099e27f11132.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5cb37592f7d36143707c41a09c92f511323eae1fadfa1dc116d4099e27f11132.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
5cb37592f7d36143707c41a09c92f511323eae1fadfa1dc116d4099e27f11132.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
5cb37592f7d36143707c41a09c92f511323eae1fadfa1dc116d4099e27f11132.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
5cb37592f7d36143707c41a09c92f511323eae1fadfa1dc116d4099e27f11132.exe
Resource
win11-20240412-en
Malware Config
Targets
-
-
Target
5cb37592f7d36143707c41a09c92f511323eae1fadfa1dc116d4099e27f11132
-
Size
1.3MB
-
MD5
02f1eaa4a9a976453c2edcdf35eb5267
-
SHA1
8dcc6ef3efb3a468457f0eacac4916b4de1a269a
-
SHA256
5cb37592f7d36143707c41a09c92f511323eae1fadfa1dc116d4099e27f11132
-
SHA512
de2454c505d6d45163ab985e16ec57146753d2f521eac9cf6f944604740c408e2ef749a6a0eb04e8cdd5f3fc39ce5327916fa07a6e91f46e4c296bb81e064362
-
SSDEEP
12288:hD0Yxtmgcj3DKjs16MKYIjhy+AC5j6vfNqM:hQYxtmiEEYIjhyQj6vfNqM
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Uses Tor communications
Malware can proxy its traffic through Tor for more anonymity.
-