General
-
Target
SecuriteInfo.com.Java.Ratty.2.30276.27803
-
Size
382KB
-
Sample
201109-epytkrrh9a
-
MD5
6772d78a5fa486484815dc766db86f45
-
SHA1
e46fafe80f104d63731370f770c94bf2f7c29a13
-
SHA256
da37e5da9af1c2a21720b0000b2615f082913d42fd835ef95227297a99cf2872
-
SHA512
acfa77f7fd88fa31adc7e5de43eb5042395846fa63fa46d844e3508862c79e10dbf268894af5f8a50a700730639f3cb819f1f1065a9d1068918fa6324748aef2
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Java.Ratty.2.30276.27803.msi
Resource
win7v20201028
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Java.Ratty.2.30276.27803.msi
Resource
win10v20201028
Malware Config
Targets
-
-
Target
SecuriteInfo.com.Java.Ratty.2.30276.27803
-
Size
382KB
-
MD5
6772d78a5fa486484815dc766db86f45
-
SHA1
e46fafe80f104d63731370f770c94bf2f7c29a13
-
SHA256
da37e5da9af1c2a21720b0000b2615f082913d42fd835ef95227297a99cf2872
-
SHA512
acfa77f7fd88fa31adc7e5de43eb5042395846fa63fa46d844e3508862c79e10dbf268894af5f8a50a700730639f3cb819f1f1065a9d1068918fa6324748aef2
Score8/10-
Blacklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Modifies service
-