General
-
Target
SecuriteInfo.com.Java.Ratty.2.16669.26428
-
Size
382KB
-
Sample
201109-4tl1f8y572
-
MD5
aa3ff63ab96d65c389f21ccd788f3f3d
-
SHA1
a8c88243d07e4293a543ab0ab98618c793e7f3db
-
SHA256
cae5dae2e0d582b80b5029fc3c89f8497badeccf6750d8dceefa47029fae3b0f
-
SHA512
9082dd93744e3ba338cd138736f6c186fefe4914fa57218b33cbd67b027ece64e1070d2cc1c72e2e5742d8e5d666193c137661897765596660d4fb1761584437
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Java.Ratty.2.16669.26428.msi
Resource
win7v20201028
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Java.Ratty.2.16669.26428.msi
Resource
win10v20201028
Malware Config
Targets
-
-
Target
SecuriteInfo.com.Java.Ratty.2.16669.26428
-
Size
382KB
-
MD5
aa3ff63ab96d65c389f21ccd788f3f3d
-
SHA1
a8c88243d07e4293a543ab0ab98618c793e7f3db
-
SHA256
cae5dae2e0d582b80b5029fc3c89f8497badeccf6750d8dceefa47029fae3b0f
-
SHA512
9082dd93744e3ba338cd138736f6c186fefe4914fa57218b33cbd67b027ece64e1070d2cc1c72e2e5742d8e5d666193c137661897765596660d4fb1761584437
Score8/10-
Blacklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Modifies service
-