General
-
Target
Loader.vmp.exe
-
Size
14.7MB
-
Sample
240929-tvg1ea1drn
-
MD5
4a2d360263e0d70effb3257869eb8e28
-
SHA1
8690352b344998f444ba9f218d514a3129ef7988
-
SHA256
cd57e487ecd13c77c9fa289607ab26ec15e5738dc1c2edef998da730ed28dee5
-
SHA512
de02cb6e69d4c30f33ea11ff54452633f27a9c0b912916f265adb688c4bb40f52d8030594205a92888cdf363c44c32e4f7c136e32ad7914fc9589ed6de733f54
-
SSDEEP
393216:GwcR8E9z+Yb4Ben+oDe8WnJCr72B/Fqyf0gstiAKO:G/RBDy6XXW07O4vjZ
Behavioral task
behavioral1
Sample
Loader.vmp.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Loader.vmp.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
J�I<-.pyc
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
J�I<-.pyc
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
Loader.vmp.exe
-
Size
14.7MB
-
MD5
4a2d360263e0d70effb3257869eb8e28
-
SHA1
8690352b344998f444ba9f218d514a3129ef7988
-
SHA256
cd57e487ecd13c77c9fa289607ab26ec15e5738dc1c2edef998da730ed28dee5
-
SHA512
de02cb6e69d4c30f33ea11ff54452633f27a9c0b912916f265adb688c4bb40f52d8030594205a92888cdf363c44c32e4f7c136e32ad7914fc9589ed6de733f54
-
SSDEEP
393216:GwcR8E9z+Yb4Ben+oDe8WnJCr72B/Fqyf0gstiAKO:G/RBDy6XXW07O4vjZ
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
J�I<-.pyc
-
Size
857B
-
MD5
68eb9b334001a5a328da69439fdfb4f5
-
SHA1
30794a24e000241759b33f9f3f6855cef6adc0e3
-
SHA256
d69409923ae2489b098cb02e842a860ad896cc07e5d9a3a2eb36d77a26415b2d
-
SHA512
5b9601249e5715bb6f2f99c5c690d9153919c3440c11069c9dc4eb3e6a339e828ef7197e190f75e86b55db58f2e5d4c402b7c390b4b349b6d04d0846c03a1fce
Score1/10 -