General
-
Target
2024-11-07_86c6b05270ea462b24f9fa39e8f8b3a5_hijackloader_luca-stealer_magniber_poet-rat_zxxz
-
Size
23.7MB
-
Sample
241107-twp3eawaqq
-
MD5
86c6b05270ea462b24f9fa39e8f8b3a5
-
SHA1
8277479f6e6e9a533144a79897f1423c78a20491
-
SHA256
aa0243615771e164c4bd2a98e1f6807418d45330b083831671d0629d10e98d20
-
SHA512
ed3d08f005fef872939059d07a817fda9e3a37d7b5593e1b04e9d22d52528f709489733917f489ee032f385be58994b99d811072eb157649faa547948bdf62df
-
SSDEEP
196608:A0QM8t8WGl814NjONUWeiHit/bcVsuBg07pbAB5xfyBd:A0Q6l8YWeipCO
Behavioral task
behavioral1
Sample
2024-11-07_86c6b05270ea462b24f9fa39e8f8b3a5_hijackloader_luca-stealer_magniber_poet-rat_zxxz.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
2024-11-07_86c6b05270ea462b24f9fa39e8f8b3a5_hijackloader_luca-stealer_magniber_poet-rat_zxxz
-
Size
23.7MB
-
MD5
86c6b05270ea462b24f9fa39e8f8b3a5
-
SHA1
8277479f6e6e9a533144a79897f1423c78a20491
-
SHA256
aa0243615771e164c4bd2a98e1f6807418d45330b083831671d0629d10e98d20
-
SHA512
ed3d08f005fef872939059d07a817fda9e3a37d7b5593e1b04e9d22d52528f709489733917f489ee032f385be58994b99d811072eb157649faa547948bdf62df
-
SSDEEP
196608:A0QM8t8WGl814NjONUWeiHit/bcVsuBg07pbAB5xfyBd:A0Q6l8YWeipCO
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-