General
-
Target
Test.exe
-
Size
9.2MB
-
Sample
240425-vkan1sch88
-
MD5
b01154c983274709022b794cf81f08e0
-
SHA1
5303aa929121973e4aad145137733081adbe863e
-
SHA256
0f96ad76723af755fc1a21af4f9b953920419105108508364b5387001381b962
-
SHA512
c2070c0d032d93fa8ec440c4a87ab9d35cd28becd9f259bb84ecc05d3711d278dbc11433fa4fca4a50928b6cbe884acc20f8a817287aeedd18f57fbdbbb96ebb
-
SSDEEP
196608:whEtL1ZUDdDwGcsAgectcGfcY3gtywIf7E5MsWSESkYeu1ODU:tHUDdk3meWcGfdlYM0KuGU
Behavioral task
behavioral1
Sample
Test.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
stub.pyc
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
Test.exe
-
Size
9.2MB
-
MD5
b01154c983274709022b794cf81f08e0
-
SHA1
5303aa929121973e4aad145137733081adbe863e
-
SHA256
0f96ad76723af755fc1a21af4f9b953920419105108508364b5387001381b962
-
SHA512
c2070c0d032d93fa8ec440c4a87ab9d35cd28becd9f259bb84ecc05d3711d278dbc11433fa4fca4a50928b6cbe884acc20f8a817287aeedd18f57fbdbbb96ebb
-
SSDEEP
196608:whEtL1ZUDdDwGcsAgectcGfcY3gtywIf7E5MsWSESkYeu1ODU:tHUDdk3meWcGfdlYM0KuGU
-
Drops file in Drivers directory
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
stub.pyc
-
Size
192KB
-
MD5
9650b872bbcea104ad5f9112832f5fa8
-
SHA1
46b57d63469e0cf5e337e4c90dd2a28d34623a54
-
SHA256
6ca323530ec77ec2a4db7c21969abf3ae77c664019cbb131f51b0f100d4835c6
-
SHA512
967dc5f4e7b5795f33cdaab310d5c42db5187b47881823151a2af8efd6241c2faf236a409b27f709db273a47d69103989d841254cb76970aa2110dd929fd08a8
-
SSDEEP
3072:EqyDaWS50q0gYFbqpBIAGWM8fRujXLMCY95R/gTy0Pj8en91d:mDaWG0q0gYFbqpBLwzfpa5R/ge0bRR
Score3/10 -