General
-
Target
forcedelctl.dll
-
Size
956KB
-
Sample
240418-rkp7xsfd39
-
MD5
b28a478eb5b99efcdc7caf428bffb89a
-
SHA1
d394c7b8fe15753bfbff79fb4f648f6f8bae70f9
-
SHA256
3bca1dcaef4430272b9029c9a4bc8be0d45ecff66e8de8679ed30d8afab00f6f
-
SHA512
decb2581f64949bfaaaf0368917f0705d7a4b7392ec272eda025cf06a4384ec4cdd5202081c2e085f00645029dd96bfef262e8628bed1861185adf6281c1cc88
-
SSDEEP
24576:rs6ZRS5J3ifJvlxfcdaeti7w+0bf0XznPMvPD:Yni8dK9CEMXD
Static task
static1
Behavioral task
behavioral1
Sample
forcedelctl.dll
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
forcedelctl.dll
-
Size
956KB
-
MD5
b28a478eb5b99efcdc7caf428bffb89a
-
SHA1
d394c7b8fe15753bfbff79fb4f648f6f8bae70f9
-
SHA256
3bca1dcaef4430272b9029c9a4bc8be0d45ecff66e8de8679ed30d8afab00f6f
-
SHA512
decb2581f64949bfaaaf0368917f0705d7a4b7392ec272eda025cf06a4384ec4cdd5202081c2e085f00645029dd96bfef262e8628bed1861185adf6281c1cc88
-
SSDEEP
24576:rs6ZRS5J3ifJvlxfcdaeti7w+0bf0XznPMvPD:Yni8dK9CEMXD
Score10/10-
Detects SSload
Detects SSload.
-
Blocklisted process makes network request
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-