General
-
Target
FinalMom.bat
-
Size
557KB
-
Sample
240701-mphleswgpd
-
MD5
e49481ba61b11f2825df521a57462210
-
SHA1
26d2ddbd11e3ce9d0fa8c543dde9100ad4481060
-
SHA256
55750bb33fca74ca670a0e4ec61d952178cf9882cc7c84416ddea253c31d1ed6
-
SHA512
3b66e19137da1b4fdfb37672cc82830185b33df7fdc04f5fe6702fb692239a97245d1720f0dbc19fc2f1444e66256b14931b2470d641243ab1951ccffceecd72
-
SSDEEP
12288:5Lk7+AcmNSZwB7WuKRDR3cktsrzRD1697kgWsGkFyoEuT8JGbEDk+:BC+ZRN3PtIFGvGKyoLTsfL
Static task
static1
Behavioral task
behavioral1
Sample
FinalMom.bat
Resource
win10-20240404-en
Malware Config
Targets
-
-
Target
FinalMom.bat
-
Size
557KB
-
MD5
e49481ba61b11f2825df521a57462210
-
SHA1
26d2ddbd11e3ce9d0fa8c543dde9100ad4481060
-
SHA256
55750bb33fca74ca670a0e4ec61d952178cf9882cc7c84416ddea253c31d1ed6
-
SHA512
3b66e19137da1b4fdfb37672cc82830185b33df7fdc04f5fe6702fb692239a97245d1720f0dbc19fc2f1444e66256b14931b2470d641243ab1951ccffceecd72
-
SSDEEP
12288:5Lk7+AcmNSZwB7WuKRDR3cktsrzRD1697kgWsGkFyoEuT8JGbEDk+:BC+ZRN3PtIFGvGKyoLTsfL
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-