General
-
Target
zzspoof.rar
-
Size
3.3MB
-
Sample
240830-2j2jnszdrc
-
MD5
5403ad211c001cc767f077cdf9e2a216
-
SHA1
a9ff8b999583624b7be60cb5d278782cf6b4cd0b
-
SHA256
2cd7eb2d8ab8b6f758cec1a8103cb271210e2a943f12984f04c751e8367e63c3
-
SHA512
03e6e524eb690fbd741c3faf39bb943ccc6c7bbc107bfc0c1e2d798adb5a7620f65c3464b6886a26e9327789d0960cb0bae712dcfaf51db560f5d53e452000c9
-
SSDEEP
98304:EEVdkM1QnJ9GsmL1ZhYLPG0BZ+dr3WO5IV0:EckMGGPbhYSOZul5x
Behavioral task
behavioral1
Sample
zzspoof.rar
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
zzspoof.rar
-
Size
3.3MB
-
MD5
5403ad211c001cc767f077cdf9e2a216
-
SHA1
a9ff8b999583624b7be60cb5d278782cf6b4cd0b
-
SHA256
2cd7eb2d8ab8b6f758cec1a8103cb271210e2a943f12984f04c751e8367e63c3
-
SHA512
03e6e524eb690fbd741c3faf39bb943ccc6c7bbc107bfc0c1e2d798adb5a7620f65c3464b6886a26e9327789d0960cb0bae712dcfaf51db560f5d53e452000c9
-
SSDEEP
98304:EEVdkM1QnJ9GsmL1ZhYLPG0BZ+dr3WO5IV0:EckMGGPbhYSOZul5x
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-