General
-
Target
ef40057c0a5784ed71b745826c84c2a4d52bf9f50cc6ca4b723716a0be4ce521
-
Size
131KB
-
Sample
240426-hkqc9aba9v
-
MD5
fa158ba3d7801e203da61c7eafa12a13
-
SHA1
eb71f862c7603797a9d7d46bda545f7d9280f451
-
SHA256
ef40057c0a5784ed71b745826c84c2a4d52bf9f50cc6ca4b723716a0be4ce521
-
SHA512
0f47c06526cb8d0e8302e440baac91e49e1fa3541e8d86e724c46dcc3b4ba2ffae445b3d217d58cb8ff66380036b98e82fc7b6f3980120d4c599d5497ce5edd1
-
SSDEEP
1536:BL+O/U7OBmKGS6CBK0t/ZCXPGuxgDM5YKBGNc/xf6KWcs8+SUkIcekqY1o/uImz2:BLxUyjp3xCTyDMsUWyw+Ubx7NX
Static task
static1
Behavioral task
behavioral1
Sample
ef40057c0a5784ed71b745826c84c2a4d52bf9f50cc6ca4b723716a0be4ce521.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
ef40057c0a5784ed71b745826c84c2a4d52bf9f50cc6ca4b723716a0be4ce521.exe
Resource
win7-20240215-en
Behavioral task
behavioral3
Sample
ef40057c0a5784ed71b745826c84c2a4d52bf9f50cc6ca4b723716a0be4ce521.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
ef40057c0a5784ed71b745826c84c2a4d52bf9f50cc6ca4b723716a0be4ce521.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
ef40057c0a5784ed71b745826c84c2a4d52bf9f50cc6ca4b723716a0be4ce521.exe
Resource
win11-20240412-en
Malware Config
Targets
-
-
Target
ef40057c0a5784ed71b745826c84c2a4d52bf9f50cc6ca4b723716a0be4ce521
-
Size
131KB
-
MD5
fa158ba3d7801e203da61c7eafa12a13
-
SHA1
eb71f862c7603797a9d7d46bda545f7d9280f451
-
SHA256
ef40057c0a5784ed71b745826c84c2a4d52bf9f50cc6ca4b723716a0be4ce521
-
SHA512
0f47c06526cb8d0e8302e440baac91e49e1fa3541e8d86e724c46dcc3b4ba2ffae445b3d217d58cb8ff66380036b98e82fc7b6f3980120d4c599d5497ce5edd1
-
SSDEEP
1536:BL+O/U7OBmKGS6CBK0t/ZCXPGuxgDM5YKBGNc/xf6KWcs8+SUkIcekqY1o/uImz2:BLxUyjp3xCTyDMsUWyw+Ubx7NX
Score6/10-
Adds Run key to start application
-
Uses Tor communications
Malware can proxy its traffic through Tor for more anonymity.
-