General
-
Target
2e2ee75c036734c2186ddfbf5afc26364957d0f5701f28d913908cdfc29752f3.rar
-
Size
496KB
-
Sample
241117-jw1tsszjem
-
MD5
1138a8f8e626762b4a76d9b705ce3aca
-
SHA1
37377b6a5b505bddaf93a1d70bc9a0010b603140
-
SHA256
2e2ee75c036734c2186ddfbf5afc26364957d0f5701f28d913908cdfc29752f3
-
SHA512
7a3987a7b3ff55737b7e1860d3a38891050e27e59fe70d05972f2c758f8c80e1ce86f23f6534adab9b2ad94bb95bfa9cb16b4df2cbc8139dfdc0a555157af812
-
SSDEEP
6144:T4n2suh/MuV9BGzKrmsfEvgZ74V8H2Sktaqr96k+w2t9XWxJk+803GJAhzRwtyHE:6Tu/MIsKrBsotuPaNw2jS3p3GO1HBR/k
Static task
static1
Behavioral task
behavioral1
Sample
AdbWinApi.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
AdbWinApi.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
adb.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
AdbWinApi.dll
-
Size
39KB
-
MD5
ee5aca085318338c4d9ca42dae966b0c
-
SHA1
b47fef6dbb5982b4159533ee1dfecef6c285a262
-
SHA256
7050084c99d02f2e837207bff7a13a261d5435589771e9dc3f0db38841b97942
-
SHA512
3e8bedb69537cb0d809e63b8bad79b533d8ab2862d282d4ef331171331ce53aba8389886689c866ee3e5cf5568e17303d8c485e40914067c183aa729131255a0
-
SSDEEP
384:SmX2Gj6sdipcJvy22fYPZaTh8T5e6OITkhUeKlrt+1nu6EDHvxtdn1XoNCLyOMk9:SFQyPghaQeITkhhWBmnTED5bLyRyu5
Score3/10 -
-
-
Target
adb.exe
-
Size
804KB
-
MD5
790fb1184a3ed8e475263daa54f98469
-
SHA1
37a60f670a4f3c68a4872ec2e95c0be2bd130dae
-
SHA256
ef4c7f4c417c18cd3394dd81ccd94381af252e0af81b0ad89b7e6d81412f4706
-
SHA512
66a2325c59a7fdacd049f43b528224682245c2705f10c50a907b6454d5755522b9d9d07046426d42db8c324ba95adbde1de087e31a0fb21b635c1dc4ca25a4f8
-
SSDEEP
12288:CMLitTtq+E3vEtR1PcUjB2ZuTvD5lnT7SQ22v9dzW74hGO2fVpUGpZdT3Rr8tz:CP5mC1P1jB2kv1xf9M4cThr8tz
-
Detects PlugX payload
-
Plugx family
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-