General
-
Target
b80103a60fa68e425a4fd200ca223915.exe
-
Size
751KB
-
Sample
210317-571xepzm3s
-
MD5
b80103a60fa68e425a4fd200ca223915
-
SHA1
635825a5b35ea82c0255ba2c2e887c27fadd76f2
-
SHA256
94658982002db6acea22c68b7619f71154933effd6428a81a235aba6e2789328
-
SHA512
089db4834228073e77dc4af4259905977df9b976f8e4837fccc5f77991fef93d62fd809c2e67b3680f94877ef54209f1693ed93fbd412a13e3de187d0586ed2e
Static task
static1
Behavioral task
behavioral1
Sample
b80103a60fa68e425a4fd200ca223915.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
b80103a60fa68e425a4fd200ca223915.exe
Resource
win10v20201028
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\readme-warning.txt
makop
Targets
-
-
Target
b80103a60fa68e425a4fd200ca223915.exe
-
Size
751KB
-
MD5
b80103a60fa68e425a4fd200ca223915
-
SHA1
635825a5b35ea82c0255ba2c2e887c27fadd76f2
-
SHA256
94658982002db6acea22c68b7619f71154933effd6428a81a235aba6e2789328
-
SHA512
089db4834228073e77dc4af4259905977df9b976f8e4837fccc5f77991fef93d62fd809c2e67b3680f94877ef54209f1693ed93fbd412a13e3de187d0586ed2e
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-