General
-
Target
417b4a38fff2e60e2a4178bd99f6a7c41e3e1ddd6c4a1384982c7907e952b671
-
Size
879KB
-
Sample
210228-fyn417h13e
-
MD5
b9c4eb9e4f25e6a069d6f4045e5f287f
-
SHA1
097022888985aafaf745dbf018b1ce7ed3056d11
-
SHA256
417b4a38fff2e60e2a4178bd99f6a7c41e3e1ddd6c4a1384982c7907e952b671
-
SHA512
dcf56268a85a47f7b223473b2ed8c55e55a480ba655ad958c7206e0ab5d6a953853ea0e224e50db999e6fc8724d4d21f0e3b406923c4cb79219822614e207cae
Static task
static1
Behavioral task
behavioral1
Sample
417b4a38fff2e60e2a4178bd99f6a7c41e3e1ddd6c4a1384982c7907e952b671.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
417b4a38fff2e60e2a4178bd99f6a7c41e3e1ddd6c4a1384982c7907e952b671.exe
Resource
win10v20201028
Malware Config
Targets
-
-
Target
417b4a38fff2e60e2a4178bd99f6a7c41e3e1ddd6c4a1384982c7907e952b671
-
Size
879KB
-
MD5
b9c4eb9e4f25e6a069d6f4045e5f287f
-
SHA1
097022888985aafaf745dbf018b1ce7ed3056d11
-
SHA256
417b4a38fff2e60e2a4178bd99f6a7c41e3e1ddd6c4a1384982c7907e952b671
-
SHA512
dcf56268a85a47f7b223473b2ed8c55e55a480ba655ad958c7206e0ab5d6a953853ea0e224e50db999e6fc8724d4d21f0e3b406923c4cb79219822614e207cae
-
NetWire RAT payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Adds Run key to start application
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-