Submission Summary:

 

Technical Details:

NOTICE: The content shown in the above window is captured automatically and is not controlled or endorsed by ThreatExpert.
Please contact us on this link should any material be offensive or inappropriate and we will ensure any such content is blocked from future viewers of the report.

 

File System Modifications

#Filename(s)File SizeFile Hash
1 %AppData%\config.json 1,440 bytes MD5: 0x9EA5434E11EF27A1443A931563B5A4F0
SHA-1: 0xD9583E43BBAE9663C97597ED7E3B7318BF2C8A9E
2 %AppData%\SearchProtocolHosts.exe 49,152 bytes MD5: 0x7F0C833BFEA4A33C2D386F843F7C0FCD
SHA-1: 0x112EA245912090DD98F4476C05E66A1CD06A3816
3 %AppData%\svnhost.exe 274,944 bytes MD5: 0x09F0192F610BB2600012CFC89BA57C54
SHA-1: 0x25C696C430F36143CD649DA3A1E885EE91F6FED4
4 %Temp%\lexahack 09.11.17.exe 514,733 bytes MD5: 0x4ECC47486C24523F25CBF7F860C13FFC
SHA-1: 0xB9AFDDF992F05E2A1C5266398CA848F7DB44F172
5 %Programs%\Startup\SearchProtocolHosts.lnk 921 bytes MD5: 0xC399DE1ECE6796A901A35E0E77238699
SHA-1: 0xB4FD30A9302588C68F04169046CCA2AB37701E53
6 [file and pathname of the sample #1] 422,708 bytes MD5: 0x39D6F39293B98CE339F1E808684B621C
SHA-1: 0xF5D56830762E3625BE9F0432EB1688C8244A9C71

 

Memory Modifications

Process NameProcess FilenameMain Module Size
lexahack 09.11.17.exe%Temp%\lexahack 09.11.17.exe401,408 bytes

 

 

All content ("Information") contained in this report is the copyrighted work of Threat Expert Ltd and its associated companies ("ThreatExpert") and may not be copied without the express permission of ThreatExpert.

The Information is provided on an "as is" basis. ThreatExpert disclaims all warranties, whether express or implied, to the maximum extent permitted by law, including the implied warranties that the Information is merchantable, of satisfactory quality, accurate, fit for a particular purpose or need, or non-infringing, unless such implied warranties are legally incapable of exclusion. Further, ThreatExpert does not warrant or make any representations regarding the use or the results of the use of the Information in terms of their correctness, accuracy, reliability, or otherwise.

Copyright © 2017 ThreatExpert. All rights reserved.