General
-
Target
X.exe
-
Size
7.6MB
-
Sample
241103-gpzbaaxbrq
-
MD5
1557e66ff5ddaa80ef07dfa354ded14d
-
SHA1
47801305beedb12fb18793023f7309ed36c2f30f
-
SHA256
d47005069444c5baab5a3d54d80e6dd969e5a6037bcf80f4c4b0e90f946db00c
-
SHA512
bce1b14830ba2893ed0adac546c63f21aacbca219b422ba11b0b4ce671dad8536f72274f9f06ba006b2a19fc6504219aa84ea1967eaebca40ab1dae5fae5d28f
-
SSDEEP
196608:NoHY57wfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jF:oIHziK1piXLGVE4Ue0VJB
Behavioral task
behavioral1
Sample
X.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
X.exe
-
Size
7.6MB
-
MD5
1557e66ff5ddaa80ef07dfa354ded14d
-
SHA1
47801305beedb12fb18793023f7309ed36c2f30f
-
SHA256
d47005069444c5baab5a3d54d80e6dd969e5a6037bcf80f4c4b0e90f946db00c
-
SHA512
bce1b14830ba2893ed0adac546c63f21aacbca219b422ba11b0b4ce671dad8536f72274f9f06ba006b2a19fc6504219aa84ea1967eaebca40ab1dae5fae5d28f
-
SSDEEP
196608:NoHY57wfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jF:oIHziK1piXLGVE4Ue0VJB
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-