General
-
Target
3de0043103731d2291d226904824c586ad24da293c50ab0ddae3da006b7fdb45.exe
-
Size
9.5MB
-
Sample
240703-fv8w8sshkm
-
MD5
1f08e087b978850e763e8af924462c20
-
SHA1
b70e86cd645e7de69feec9ab9c7bafd90fcb28dd
-
SHA256
3de0043103731d2291d226904824c586ad24da293c50ab0ddae3da006b7fdb45
-
SHA512
b8e50e69db391c4bc57c43f8cf74400674b99e7d402d77ec6cc63b3ad6cd0bd201b59682ad0121e9ad36e99f110ef55df6590a0e3a5226a95910b7b34b5e3bc7
-
SSDEEP
98304:BiAYMQSlV4A5UC0td7tS4MkKY2rzailsSq9I5TRkiuwzUsEObHFcPEWWOnpMaEJT:BY6UCEqk12rzF7qeSEUHOVWWMpH6UW
Static task
static1
Behavioral task
behavioral1
Sample
3de0043103731d2291d226904824c586ad24da293c50ab0ddae3da006b7fdb45.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3de0043103731d2291d226904824c586ad24da293c50ab0ddae3da006b7fdb45.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.iiko.ru - Port:
21 - Username:
partners - Password:
partners#iiko
Targets
-
-
Target
3de0043103731d2291d226904824c586ad24da293c50ab0ddae3da006b7fdb45.exe
-
Size
9.5MB
-
MD5
1f08e087b978850e763e8af924462c20
-
SHA1
b70e86cd645e7de69feec9ab9c7bafd90fcb28dd
-
SHA256
3de0043103731d2291d226904824c586ad24da293c50ab0ddae3da006b7fdb45
-
SHA512
b8e50e69db391c4bc57c43f8cf74400674b99e7d402d77ec6cc63b3ad6cd0bd201b59682ad0121e9ad36e99f110ef55df6590a0e3a5226a95910b7b34b5e3bc7
-
SSDEEP
98304:BiAYMQSlV4A5UC0td7tS4MkKY2rzailsSq9I5TRkiuwzUsEObHFcPEWWOnpMaEJT:BY6UCEqk12rzF7qeSEUHOVWWMpH6UW
Score10/10-
Loads dropped DLL
-