General
-
Target
ff769e5742cd29ad43c72253f2ccac27832710be32f44cb0a7d91a626ac72645
-
Size
797KB
-
Sample
201108-6xnjm1kt5e
-
MD5
d359ddfb5765789a694878a3c2138c78
-
SHA1
5d50b7ad689cb9efd42b1719fdcf937c1f80e2e9
-
SHA256
ff769e5742cd29ad43c72253f2ccac27832710be32f44cb0a7d91a626ac72645
-
SHA512
aa7762b2deef07a5dce55743242cfb7726ebbf5a2796e89bb50fcc0d7e1ae4b8c7c0f8651f42675bcdae2669228a500bdf2e5f09ef00e4250843e671f20443c5
Static task
static1
Behavioral task
behavioral1
Sample
ff769e5742cd29ad43c72253f2ccac27832710be32f44cb0a7d91a626ac72645.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
ff769e5742cd29ad43c72253f2ccac27832710be32f44cb0a7d91a626ac72645
-
Size
797KB
-
MD5
d359ddfb5765789a694878a3c2138c78
-
SHA1
5d50b7ad689cb9efd42b1719fdcf937c1f80e2e9
-
SHA256
ff769e5742cd29ad43c72253f2ccac27832710be32f44cb0a7d91a626ac72645
-
SHA512
aa7762b2deef07a5dce55743242cfb7726ebbf5a2796e89bb50fcc0d7e1ae4b8c7c0f8651f42675bcdae2669228a500bdf2e5f09ef00e4250843e671f20443c5
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-