General
-
Target
SQLi v.8.5.exe
-
Size
12.7MB
-
Sample
240602-lr35gaad22
-
MD5
d887c03a2d230dc196c8b3ac47030b9e
-
SHA1
b4d08bf36841ffdeb0750455021a707804f8d509
-
SHA256
b693010f3f342fb06dd959f2553b7937d5daeaf9b4b7fd800ed5a9a6d8a099e7
-
SHA512
6cee30d2448b930504f0933ca04e7f30fb3e1f2924d490146c0168308298d222cf5eb83885da405ba8fcd92b7f4979e23b4f9c706c936df5bfb52d2819022072
-
SSDEEP
196608:OhzlOFCwaHNFrXW+YrDkx/NNYz7vPmHpBt:2zMCwaHNlXW+Y/kx/TyPmj
Static task
static1
Behavioral task
behavioral1
Sample
SQLi v.8.5.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
SQLi v.8.5.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
bitrat
1.34
80.85.156.209:8080
-
communication_password
ae5eb824ef87499f644c3f11a7176157
-
tor_process
tor
Targets
-
-
Target
SQLi v.8.5.exe
-
Size
12.7MB
-
MD5
d887c03a2d230dc196c8b3ac47030b9e
-
SHA1
b4d08bf36841ffdeb0750455021a707804f8d509
-
SHA256
b693010f3f342fb06dd959f2553b7937d5daeaf9b4b7fd800ed5a9a6d8a099e7
-
SHA512
6cee30d2448b930504f0933ca04e7f30fb3e1f2924d490146c0168308298d222cf5eb83885da405ba8fcd92b7f4979e23b4f9c706c936df5bfb52d2819022072
-
SSDEEP
196608:OhzlOFCwaHNFrXW+YrDkx/NNYz7vPmHpBt:2zMCwaHNlXW+Y/kx/TyPmj
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-