General
-
Target
zz.exe
-
Size
8.1MB
-
Sample
240620-rwj52ssdmb
-
MD5
53f108d2705d15638e3fd1698f062a6d
-
SHA1
c7d8fe80c76731bde2a3d2f568031286b20b842e
-
SHA256
0ad8eb0e1abf23438a088ca98f746f665420603720e73b89a5f36b57ffb9533f
-
SHA512
85803eff0c9fb8918b1811ad3967c754a4b1568528801b840dfe1f77919e76a563f5d26e3d62ead8d139cf9d18ee6b898a3cdcbc142bebd3f4bd3aebab739817
-
SSDEEP
196608:fsHgxgdqBA1HeT39IigQdeE9TFa0Z8DOjCdyl9nQf/GoyKh:zg4q1+TtIiLUY9Z8D8Ccl9QLyKh
Behavioral task
behavioral1
Sample
zz.exe
Resource
win10-20240404-en
Malware Config
Targets
-
-
Target
zz.exe
-
Size
8.1MB
-
MD5
53f108d2705d15638e3fd1698f062a6d
-
SHA1
c7d8fe80c76731bde2a3d2f568031286b20b842e
-
SHA256
0ad8eb0e1abf23438a088ca98f746f665420603720e73b89a5f36b57ffb9533f
-
SHA512
85803eff0c9fb8918b1811ad3967c754a4b1568528801b840dfe1f77919e76a563f5d26e3d62ead8d139cf9d18ee6b898a3cdcbc142bebd3f4bd3aebab739817
-
SSDEEP
196608:fsHgxgdqBA1HeT39IigQdeE9TFa0Z8DOjCdyl9nQf/GoyKh:zg4q1+TtIiLUY9Z8D8Ccl9QLyKh
Score7/10-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-