General
-
Target
Untitled.jpg
-
Size
97KB
-
Sample
250305-bdakwsvks5
-
MD5
7c47e57cb3745c79d363b7bdbb5a39d6
-
SHA1
572e084821f5e1393869b1dd35065d1f0140e2f4
-
SHA256
b5232d6b3e84b3d3da8c6e07fa5438b3ad5bc73c620b3c6769117009216339a2
-
SHA512
8c4f106b9d63c7deca71b0618dd97dbb0fe9f4d7c4c3aa559338061e87cefc76ca29cc3a3db3c244aeb7e17c930939906f86caec03f3c02ab8d35e8eb0bfd706
-
SSDEEP
3072:Q35vPGIPuOx0XD5EKlIgNdBvQv3AAeSzPS:m5XGuID5EcpW3U66
Static task
static1
Behavioral task
behavioral1
Sample
Untitled.jpg
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
Untitled.jpg
Resource
win10v2004-20250217-en
Malware Config
Extracted
bitrat
1.38
current-necessity.at.ply.gg:49446
-
communication_password
c5e4e64cc9384fda09aa232c1811af0e
-
install_dir
MsSystemDriver
-
install_file
MsMpEng.exe
-
tor_process
tor
Targets
-
-
Target
Untitled.jpg
-
Size
97KB
-
MD5
7c47e57cb3745c79d363b7bdbb5a39d6
-
SHA1
572e084821f5e1393869b1dd35065d1f0140e2f4
-
SHA256
b5232d6b3e84b3d3da8c6e07fa5438b3ad5bc73c620b3c6769117009216339a2
-
SHA512
8c4f106b9d63c7deca71b0618dd97dbb0fe9f4d7c4c3aa559338061e87cefc76ca29cc3a3db3c244aeb7e17c930939906f86caec03f3c02ab8d35e8eb0bfd706
-
SSDEEP
3072:Q35vPGIPuOx0XD5EKlIgNdBvQv3AAeSzPS:m5XGuID5EcpW3U66
-
Bitrat family
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-