General
-
Target
AMPh
-
Size
20KB
-
Sample
240517-ksww4saf33
-
MD5
5d25088362a7ff6c87b7f4e7f4432c77
-
SHA1
3e4cf0ad114f36433413027745888d0f32cdcb93
-
SHA256
291e2c9cad2fb08525ff12ad7793f5d44c6079d42ef847d4c8a2c5e9867ff5c6
-
SHA512
761043ee109b60c492a16a81936f1966365a2be43d274c4d799332c022234ce86dd3c96ba4165bed579b4db4cc366fbbe6b9340109466f70e25e3f84aa00bca6
-
SSDEEP
192:DQ7hEoDghUpeWw9y89uQABYmfj28NZXIQhVaEa2i8ca1Wb/:DQe+yAfrVBdaEaU1Wr
Static task
static1
Malware Config
Targets
-
-
Target
AMPh
-
Size
20KB
-
MD5
5d25088362a7ff6c87b7f4e7f4432c77
-
SHA1
3e4cf0ad114f36433413027745888d0f32cdcb93
-
SHA256
291e2c9cad2fb08525ff12ad7793f5d44c6079d42ef847d4c8a2c5e9867ff5c6
-
SHA512
761043ee109b60c492a16a81936f1966365a2be43d274c4d799332c022234ce86dd3c96ba4165bed579b4db4cc366fbbe6b9340109466f70e25e3f84aa00bca6
-
SSDEEP
192:DQ7hEoDghUpeWw9y89uQABYmfj28NZXIQhVaEa2i8ca1Wb/:DQe+yAfrVBdaEaU1Wr
-
Async RAT payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-