General
-
Target
ceaab53560fe27d25ae139dd736a26f32daf3a1b3ce8410c1153a422205dea81
-
Size
1.9MB
-
Sample
240507-kqly5abh68
-
MD5
c4ee55c8f75cf73eb54594775e06a94a
-
SHA1
3604f680c80cd43621ca45dc911e61e14cf24cb6
-
SHA256
ceaab53560fe27d25ae139dd736a26f32daf3a1b3ce8410c1153a422205dea81
-
SHA512
f13b63c25aba363d81f98ed3a14808f64865ba13f1956adffd0f5202a20c2c51a294519e030d079fa5825a88cf6066ad13db4257c00eadfa873a55b2c4acbc18
-
SSDEEP
49152:d/bZlebN53l9AsH7yGkm0IP9C/+7iNQXf3DLXrvjA:Ubn3zAu7l50SC2+CTT
Static task
static1
Behavioral task
behavioral1
Sample
ceaab53560fe27d25ae139dd736a26f32daf3a1b3ce8410c1153a422205dea81.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral2
Sample
ceaab53560fe27d25ae139dd736a26f32daf3a1b3ce8410c1153a422205dea81.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
ceaab53560fe27d25ae139dd736a26f32daf3a1b3ce8410c1153a422205dea81.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
ceaab53560fe27d25ae139dd736a26f32daf3a1b3ce8410c1153a422205dea81.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
ceaab53560fe27d25ae139dd736a26f32daf3a1b3ce8410c1153a422205dea81.exe
Resource
win11-20240419-en
Malware Config
Extracted
Protocol: ftp- Host:
basemarket.ru - Port:
21 - Username:
[email protected]
Extracted
Protocol: ftp- Host:
54prokat.ru - Port:
21 - Username:
[email protected] - Password:
vjnqepr
Extracted
Protocol: ftp- Host:
gank4.com - Port:
21 - Username:
[email protected]
Extracted
Protocol: ftp- Host:
xi-tech.com - Port:
21 - Username:
[email protected] - Password:
B2aster234stro2730
Extracted
Protocol: ftp- Host:
commerzdirektservice.de - Port:
21 - Username:
[email protected] - Password:
E7m
Extracted
Protocol: ftp- Host:
www.commerzdirektservice.de - Port:
21 - Username:
ayseguel.karslioglu - Password:
E7m
Extracted
Protocol: ftp- Host:
maxitrans.de - Port:
21 - Username:
[email protected] - Password:
dODUHA
Extracted
Protocol: ftp- Host:
users.alriyada.ly - Port:
21 - Username:
[email protected]
Extracted
Protocol: ftp- Host:
users.alriyada.ly - Port:
21 - Username:
mohsh
Extracted
Protocol: ftp- Host:
users.alriyada.ly - Port:
21 - Username:
admin
Targets
-
-
Target
ceaab53560fe27d25ae139dd736a26f32daf3a1b3ce8410c1153a422205dea81
-
Size
1.9MB
-
MD5
c4ee55c8f75cf73eb54594775e06a94a
-
SHA1
3604f680c80cd43621ca45dc911e61e14cf24cb6
-
SHA256
ceaab53560fe27d25ae139dd736a26f32daf3a1b3ce8410c1153a422205dea81
-
SHA512
f13b63c25aba363d81f98ed3a14808f64865ba13f1956adffd0f5202a20c2c51a294519e030d079fa5825a88cf6066ad13db4257c00eadfa873a55b2c4acbc18
-
SSDEEP
49152:d/bZlebN53l9AsH7yGkm0IP9C/+7iNQXf3DLXrvjA:Ubn3zAu7l50SC2+CTT
Score10/10-
Adds Run key to start application
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Suspicious use of SetThreadContext
-