General
-
Target
2dad4b0d2557af1cadd3c7cb8e06f37c767c6565d2ec598a116a3063b92b0420
-
Size
596KB
-
Sample
241023-bkf19avhkk
-
MD5
6073b84bbdc3b910df55b8b42a16ab65
-
SHA1
28c95e7d8f2fa7dee552bcc190b7ec6aaa9ea9f3
-
SHA256
2dad4b0d2557af1cadd3c7cb8e06f37c767c6565d2ec598a116a3063b92b0420
-
SHA512
1392956610ded25dc8e5ca50c5a15218e3a2ecdc12314ae7bf0313a47dd35c2ead7aba74fc7381542c2e107b547bbef23f9be1ea8ff653b3da1e1f951485a50d
-
SSDEEP
12288:JJRTchjxyfDF5NYzNewgU8mLQobusNRO+IXbpwOjMbR6I6EfjOvCxicvG:JJp4j2FYReBm9bpNROtgt6zErkC7vG
Static task
static1
Behavioral task
behavioral1
Sample
2dad4b0d2557af1cadd3c7cb8e06f37c767c6565d2ec598a116a3063b92b0420.xlam
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2dad4b0d2557af1cadd3c7cb8e06f37c767c6565d2ec598a116a3063b92b0420.xlam
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
Targets
-
-
Target
2dad4b0d2557af1cadd3c7cb8e06f37c767c6565d2ec598a116a3063b92b0420
-
Size
596KB
-
MD5
6073b84bbdc3b910df55b8b42a16ab65
-
SHA1
28c95e7d8f2fa7dee552bcc190b7ec6aaa9ea9f3
-
SHA256
2dad4b0d2557af1cadd3c7cb8e06f37c767c6565d2ec598a116a3063b92b0420
-
SHA512
1392956610ded25dc8e5ca50c5a15218e3a2ecdc12314ae7bf0313a47dd35c2ead7aba74fc7381542c2e107b547bbef23f9be1ea8ff653b3da1e1f951485a50d
-
SSDEEP
12288:JJRTchjxyfDF5NYzNewgU8mLQobusNRO+IXbpwOjMbR6I6EfjOvCxicvG:JJp4j2FYReBm9bpNROtgt6zErkC7vG
-
Blocklisted process makes network request
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-