General
-
Target
2ff18fb4a4d05b7d419a88167d7001bb000eac2f4861bf3849a713b6b701f4c9
-
Size
209KB
-
Sample
240418-m8lgesce31
-
MD5
8e9ddb099e71555326413d9a3a930584
-
SHA1
96350dae3f42d37341b3da7410aabe5c42384156
-
SHA256
2ff18fb4a4d05b7d419a88167d7001bb000eac2f4861bf3849a713b6b701f4c9
-
SHA512
8d34f32ee48e3d399e020ba3ab4eeab9f1fbdb55a4a5b61b120280975990058221c75be001d09b4f804400977bb769e9ba1fdbd68e90f7db97bd78a69001f09c
-
SSDEEP
6144:YDnLgI91y1UkT57iJz/DpURWPSvHuUiYphu1Ux:cnLh9yn52rpUR5vHuRYpM+x
Behavioral task
behavioral1
Sample
2ff18fb4a4d05b7d419a88167d7001bb000eac2f4861bf3849a713b6b701f4c9.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
2ff18fb4a4d05b7d419a88167d7001bb000eac2f4861bf3849a713b6b701f4c9.exe
Resource
win7-20231129-en
Behavioral task
behavioral3
Sample
2ff18fb4a4d05b7d419a88167d7001bb000eac2f4861bf3849a713b6b701f4c9.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
2ff18fb4a4d05b7d419a88167d7001bb000eac2f4861bf3849a713b6b701f4c9.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
systembc
yan0212.com:4039
yan0212.net:4039
Targets
-
-
Target
2ff18fb4a4d05b7d419a88167d7001bb000eac2f4861bf3849a713b6b701f4c9
-
Size
209KB
-
MD5
8e9ddb099e71555326413d9a3a930584
-
SHA1
96350dae3f42d37341b3da7410aabe5c42384156
-
SHA256
2ff18fb4a4d05b7d419a88167d7001bb000eac2f4861bf3849a713b6b701f4c9
-
SHA512
8d34f32ee48e3d399e020ba3ab4eeab9f1fbdb55a4a5b61b120280975990058221c75be001d09b4f804400977bb769e9ba1fdbd68e90f7db97bd78a69001f09c
-
SSDEEP
6144:YDnLgI91y1UkT57iJz/DpURWPSvHuUiYphu1Ux:cnLh9yn52rpUR5vHuRYpM+x
-
Executes dropped EXE
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Uses Tor communications
Malware can proxy its traffic through Tor for more anonymity.
-