General
-
Target
d7a52acd99d213cdeb1f91ed193868d0.exe
-
Size
430KB
-
Sample
201119-33bmyzzggn
-
MD5
d7a52acd99d213cdeb1f91ed193868d0
-
SHA1
2bdc67502dc92d021ce64e92c7efcbdc6a00ad76
-
SHA256
b33d85386890e691d20cd76ee9f39b083f54143b597701e3a1687bcf832fb0ca
-
SHA512
f3f940f44b9f64eec721391e635f5a5fe9f5d1362b16ba7e46831ca39d2d3223d26211da1a72c82daf41e9e20d9f7b7356bbd6bb67c31e26558c34ee39415cb0
Static task
static1
Behavioral task
behavioral1
Sample
d7a52acd99d213cdeb1f91ed193868d0.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
d7a52acd99d213cdeb1f91ed193868d0.exe
Resource
win10v20201028
Malware Config
Extracted
oski
taenaiaa.ac.ug
Targets
-
-
Target
d7a52acd99d213cdeb1f91ed193868d0.exe
-
Size
430KB
-
MD5
d7a52acd99d213cdeb1f91ed193868d0
-
SHA1
2bdc67502dc92d021ce64e92c7efcbdc6a00ad76
-
SHA256
b33d85386890e691d20cd76ee9f39b083f54143b597701e3a1687bcf832fb0ca
-
SHA512
f3f940f44b9f64eec721391e635f5a5fe9f5d1362b16ba7e46831ca39d2d3223d26211da1a72c82daf41e9e20d9f7b7356bbd6bb67c31e26558c34ee39415cb0
Score10/10-
Downloads MZ/PE file
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-