General
-
Target
이력서_경력사항은 모두 기재하였습니다 확인부탁드리겠습니다 감사합니다.exe
-
Size
196KB
-
Sample
200624-npxpbsefrn
-
MD5
2b581dad6e832d91b1e03ad22ead74a3
-
SHA1
f9b81dba7907a7f95690a09eb4d71c74fd753f75
-
SHA256
ff91860e1c0ee0dda06ef8e326e2e284ee7ec0de97ee80348720c5ab637f8cf5
-
SHA512
2c9e568c6f104a406cad3fc68618d15f839833e01a791755223e7f6e55bc6dc656c56e74b1160c0923aaaef473e3aefcf782ee7d1ec7220a1cdb12d1c959afe5
Static task
static1
Behavioral task
behavioral1
Sample
이력서_경력사항은 모두 기재하였습니다 확인부탁드리겠습니다 감사합니다.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
이력서_경력사항은 모두 기재하였습니다 확인부탁드리겠습니다 감사합니다.exe
Resource
win10
Malware Config
Extracted
C:\readme-warning.txt
makop
Targets
-
-
Target
이력서_경력사항은 모두 기재하였습니다 확인부탁드리겠습니다 감사합니다.exe
-
Size
196KB
-
MD5
2b581dad6e832d91b1e03ad22ead74a3
-
SHA1
f9b81dba7907a7f95690a09eb4d71c74fd753f75
-
SHA256
ff91860e1c0ee0dda06ef8e326e2e284ee7ec0de97ee80348720c5ab637f8cf5
-
SHA512
2c9e568c6f104a406cad3fc68618d15f839833e01a791755223e7f6e55bc6dc656c56e74b1160c0923aaaef473e3aefcf782ee7d1ec7220a1cdb12d1c959afe5
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Deletes system backup catalog
Ransomware often tries to delete backup files to inhibit system recovery.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run entry to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Modifies service
-