General
-
Target
포트폴리오_경력사항은 모두 기재하였습니다 확인부탁드리겠습니다 감사합니다.exe
-
Size
219KB
-
Sample
200624-97pqgehnv2
-
MD5
f5c6ded07077609d36b4d7886d036e57
-
SHA1
0ba487e27864c387470d826de70c1a13219d2312
-
SHA256
53f5bc946c2b606ab261ee661fba8d32e355455591080c64003214c74c23b994
-
SHA512
dd6b9a15eafaeefe7f6793e9d519ff22effb82183b5bae4a172db3fd6cfda786fdfc3833a117a1c9a486ae9357c8c25008e48b090aea83037fdf7626ba295616
Static task
static1
Behavioral task
behavioral1
Sample
포트폴리오_경력사항은 모두 기재하였습니다 확인부탁드리겠습니다 감사합니다.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
포트폴리오_경력사항은 모두 기재하였습니다 확인부탁드리겠습니다 감사합니다.exe
Resource
win10
Malware Config
Extracted
C:\readme-warning.txt
makop
Targets
-
-
Target
포트폴리오_경력사항은 모두 기재하였습니다 확인부탁드리겠습니다 감사합니다.exe
-
Size
219KB
-
MD5
f5c6ded07077609d36b4d7886d036e57
-
SHA1
0ba487e27864c387470d826de70c1a13219d2312
-
SHA256
53f5bc946c2b606ab261ee661fba8d32e355455591080c64003214c74c23b994
-
SHA512
dd6b9a15eafaeefe7f6793e9d519ff22effb82183b5bae4a172db3fd6cfda786fdfc3833a117a1c9a486ae9357c8c25008e48b090aea83037fdf7626ba295616
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Deletes system backup catalog
Ransomware often tries to delete backup files to inhibit system recovery.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run entry to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Modifies service
-