General
-
Target
4808197da288d4774ff43b0ef6603c7fd03eaa5f15018fd6e919f13e1b4445ec
-
Size
949KB
-
Sample
241216-qlpr4sslcl
-
MD5
3c9a67964fc0ef1987c108454769cfc4
-
SHA1
9efe11dba7949564cc20a6d5bbc8a768d91ba14a
-
SHA256
4808197da288d4774ff43b0ef6603c7fd03eaa5f15018fd6e919f13e1b4445ec
-
SHA512
64670cd8134c42d95517983eb2534cba5187e346239e293e6bf212a6436ea1d98cd89b705e98f23551e044d285320aa77fd9c4c40dbfc1ec1c8e3a9fcdf76247
-
SSDEEP
24576:EVTuAvwBPbS1xbesLbphxdiviPS2VFu8c2C25w:E7v2zaoelhfpS+5w
Static task
static1
Behavioral task
behavioral1
Sample
Dsfpk.exe
Resource
win7-20240903-en
Malware Config
Extracted
systembc
wodresomdaymomentum.org
-
dns
5.132.191.104
Targets
-
-
Target
Dsfpk.exe
-
Size
1019KB
-
MD5
a2db8a666e3c03f04aafd86aa68a0ed1
-
SHA1
03c31e7c1e3156fdced6cf7345a21c06db1836dc
-
SHA256
9a3d939bbe9de696c16e62809944be0258ca11c2117381fdc0b5fa1986606191
-
SHA512
5ffff2f496d2a581d58e87b3a22b076d6ec0b8389f6cacc737c1cd9386ce33cbd873284226d665f4856aa08d5dfde322c3f4bf18254d47ba8b0cbb1e0165c2bf
-
SSDEEP
24576:6vCnHLe19bQ8JbpTFd0vcLSG7FuEw2C2:6vUrWWalT7nSG
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Systembc family
-
Drops startup file
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-