Resubmissions
20/11/2024, 02:41
241120-c6pe7atmbm 8General
-
Target
qZBMopqFzc.exe
-
Size
10.9MB
-
Sample
241120-c6pe7atmbm
-
MD5
4e150098282968ae53f70cb438b7ac54
-
SHA1
5b75c311c5cb4f34f91795c58d1f8ba3bc8d12a6
-
SHA256
c089ff775a43c52eb5ffa830c82f66f4b24301b5472c0b8a7b63988e13481d33
-
SHA512
fc25f6667db912120237b8a0767ea5a12a34963c0615a0c633e1741a38e2f91f9de721699ddf5db1ee2368caf67b297ec25e34aa81ad0dee9bfc943626fa9ce3
-
SSDEEP
98304:67wDkgcrK0K+LZi5a7eOGGFPv5JInm66wuL:wwDRG9hZi5a7uGF35e76BL
Static task
static1
Behavioral task
behavioral1
Sample
qZBMopqFzc.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Targets
-
-
Target
qZBMopqFzc.exe
-
Size
10.9MB
-
MD5
4e150098282968ae53f70cb438b7ac54
-
SHA1
5b75c311c5cb4f34f91795c58d1f8ba3bc8d12a6
-
SHA256
c089ff775a43c52eb5ffa830c82f66f4b24301b5472c0b8a7b63988e13481d33
-
SHA512
fc25f6667db912120237b8a0767ea5a12a34963c0615a0c633e1741a38e2f91f9de721699ddf5db1ee2368caf67b297ec25e34aa81ad0dee9bfc943626fa9ce3
-
SSDEEP
98304:67wDkgcrK0K+LZi5a7eOGGFPv5JInm66wuL:wwDRG9hZi5a7uGF35e76BL
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
A potential corporate email address has been identified in the URL: [email protected]
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-