General
-
Target
12.0
-
Size
37KB
-
Sample
210323-4hrptprszx
-
MD5
af18cd9e59906e5c56bd5a07502b1f0b
-
SHA1
3bc5960b69cbd0266e66dfea9e6d9eb6365ae78a
-
SHA256
93db19c454405ef70de2ead0a3b2158e0d8cc8c3bb663c3af15a0df1b008fc53
-
SHA512
35e56125884be604b45d11fc318d022bbd021ff83f8cc41fe606d91eb8f6a4770e319ff92fc9ff0119c3bbc34557be0ac41f64d90538186852269efd54144281
Static task
static1
Behavioral task
behavioral1
Sample
12.0.dll
Resource
win7v20201028
Behavioral task
behavioral2
Sample
12.0.dll
Resource
win10v20201028
Malware Config
Targets
-
-
Target
12.0
-
Size
37KB
-
MD5
af18cd9e59906e5c56bd5a07502b1f0b
-
SHA1
3bc5960b69cbd0266e66dfea9e6d9eb6365ae78a
-
SHA256
93db19c454405ef70de2ead0a3b2158e0d8cc8c3bb663c3af15a0df1b008fc53
-
SHA512
35e56125884be604b45d11fc318d022bbd021ff83f8cc41fe606d91eb8f6a4770e319ff92fc9ff0119c3bbc34557be0ac41f64d90538186852269efd54144281
Score10/10-
Bazar/Team9 Loader payload
-
Nloader Payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Adds Run key to start application
-