General
-
Target
text.txt
-
Size
183B
-
Sample
240710-v2b86szfpr
-
MD5
7d22a7c501b54f3f4c889a4c6a56c6c1
-
SHA1
0320dce6fda62bcd576013fd0b787bb715ba64bf
-
SHA256
0f44f6cf90b1f970e597d52a33601aa052f473ebaea67436cc181bc46e8d9650
-
SHA512
36680a3cfdeee00d5b9ba968542e2aec43efcf4bc7c8aeb3783b4282f8bc435a830d3ec4ed9f5a545cddcf4bee2503e1920935450dbcefedd006d675e700f56a
Static task
static1
Behavioral task
behavioral1
Sample
text.txt
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
text.txt
-
Size
183B
-
MD5
7d22a7c501b54f3f4c889a4c6a56c6c1
-
SHA1
0320dce6fda62bcd576013fd0b787bb715ba64bf
-
SHA256
0f44f6cf90b1f970e597d52a33601aa052f473ebaea67436cc181bc46e8d9650
-
SHA512
36680a3cfdeee00d5b9ba968542e2aec43efcf4bc7c8aeb3783b4282f8bc435a830d3ec4ed9f5a545cddcf4bee2503e1920935450dbcefedd006d675e700f56a
-
Blocklisted process makes network request
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-