General
-
Target
UgxVfzAdgF.exe
-
Size
21.5MB
-
Sample
240626-2dknzazgpp
-
MD5
c7e8cda6a0c9f855bc55a7bdbc80bb1e
-
SHA1
9234592aa78d6b263f15fef977ba11cdec1c3808
-
SHA256
61349cfc837b932e2d85539c750d522368f2d3f458dd7e30046ea25f806fd4a7
-
SHA512
528f358305260805c3ed4c8721a97dede33fb3ef51baf498ea983c2bc43f9aa79e4c679e9133e28090feb9cb42e34ade5f2ed08585f9b41187d3c011a5612268
-
SSDEEP
393216:1o9DM45Cy0ny5+Z0SAvurEUWj+rcfoEwPKk9buK+:a9Nr0ny5+Z0SadbmcfoCkEK+
Behavioral task
behavioral1
Sample
UgxVfzAdgF.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
UgxVfzAdgF.exe
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
UgxVfzAdgF.exe
-
Size
21.5MB
-
MD5
c7e8cda6a0c9f855bc55a7bdbc80bb1e
-
SHA1
9234592aa78d6b263f15fef977ba11cdec1c3808
-
SHA256
61349cfc837b932e2d85539c750d522368f2d3f458dd7e30046ea25f806fd4a7
-
SHA512
528f358305260805c3ed4c8721a97dede33fb3ef51baf498ea983c2bc43f9aa79e4c679e9133e28090feb9cb42e34ade5f2ed08585f9b41187d3c011a5612268
-
SSDEEP
393216:1o9DM45Cy0ny5+Z0SAvurEUWj+rcfoEwPKk9buK+:a9Nr0ny5+Z0SadbmcfoCkEK+
-
Drops startup file
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-