File: 5b9f66431ddf53447408195d9b657aa7

Metadata
File name:ref_0000r21_detalles general_de_la_informacion_de_a_cuerdo_solicitud_pdf.exe
File type:PE32 executable (GUI) Intel 80386, for MS Windows
File size:316638 bytes
Analysis date:2017-07-24 13:25:39
MD5:5b9f66431ddf53447408195d9b657aa7
SHA1:fa2816d0aa47033011ac2dd9e90f470c3f247672
SHA256:8f3f63cfdf9d7695384783a65823e4eaea95dbf474c00cb084d05b7e9e1cce04
SHA512:0e9a6730185ed726bd86c3af7865e74623fb33c6beb3ca43b91db9591153237f545d1eb566fcd4fef607874129e0536c1e28c74878122fe1f83f486216c09888
SSDEEP:3072:QufkJqr2zIcnJgGAM/W/IirL8c3K1R3p0IO2fxPEsvVSWOfg0ilL:Qu2q68zbL8caR3p0MOmVbOXix
IMPHASH:c3bf1d8af719c6590d3841252d3bafd9
Authentihash:N/A
Related resources
APTNotes
Cyber threat intelligence reports associated with 5b9f66431ddf53447408195d9b657aa7.
Loading...
Domains
Domains the malware sample communicates with.
Hosts
Hosts the malware sample communicates with.
HTTP Requests
HTTP requests the malware sample makes.
HostURLUser-Agent
181.141.6.106:2090/1234567890.functionsMozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; InfoPath.2; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022)
Mutants
Mutants created by the malware sample.
Registry keys
Registry keys created by the malware sample.
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager
HKEY_USERS\S-1-5-21-1547161642-507921405-839522115-1004\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF
HKEY_LOCAL_MACHINE\Software\Microsoft\CTF\SystemShared
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Nls\Codepage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\VBA\Monitors
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\HTML Help
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Help
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lBVQMb.dll
Comments
User comments about 5b9f66431ddf53447408195d9b657aa7.
NOTICE: We have updated our privacy terms and conditions in accordance to GDPR. By using our site, you acknowledge that you have read and understand our Privacy Policy. Your use of ThreatMiner’s Products and Services is subject to these policies and terms.