General
-
Target
redirect
-
Size
6KB
-
Sample
240427-2ksm6aab59
-
MD5
7e78592c04c640ad6744d4065a400430
-
SHA1
095b950e5735ce303216f3f8da4c8e9865200abb
-
SHA256
fb706fe7be78abe8a50d077a1918b624b836dbe2d6f27fa8e20750118384e4b8
-
SHA512
69a44b9fa1a0f50629bddaf7b54d1d9a8b17e0b34761bd6896b3ef097811025e5c98f0ce080c6117f2c30d36fe23fb442eeadbb799e40317b10f113ecf814bd3
-
SSDEEP
192:dSHLxX7777/77QF7Eyrs0Lod4BYCIpzOrXeR:dSr5HYk0+CIpzOrXC
Static task
static1
Behavioral task
behavioral1
Sample
redirect.html
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
redirect.html
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
redirect
-
Size
6KB
-
MD5
7e78592c04c640ad6744d4065a400430
-
SHA1
095b950e5735ce303216f3f8da4c8e9865200abb
-
SHA256
fb706fe7be78abe8a50d077a1918b624b836dbe2d6f27fa8e20750118384e4b8
-
SHA512
69a44b9fa1a0f50629bddaf7b54d1d9a8b17e0b34761bd6896b3ef097811025e5c98f0ce080c6117f2c30d36fe23fb442eeadbb799e40317b10f113ecf814bd3
-
SSDEEP
192:dSHLxX7777/77QF7Eyrs0Lod4BYCIpzOrXeR:dSr5HYk0+CIpzOrXC
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Legitimate hosting services abused for malware hosting/C2
-