General
-
Target
Fat32Formatter.exe
-
Size
286KB
-
Sample
210324-s8lfjacvba
-
MD5
fc080ffd9e95c2d8694a139e84c673ef
-
SHA1
195c3e7ce30b55d52b7e4bdca74613e2c9f7c16b
-
SHA256
c5645239e94a63f672ce815de8a5f11c642ad0fdafe7ab0091807f7e286e3bfd
-
SHA512
c969b8af4169d07653111ab31f4b4b4c5dc9582fe8e2de0e3986e9a5b2eca288751bbe57880b5adb6f2adfb1aac1c254314765abbc18be59877c6d526b2c56a2
Static task
static1
Behavioral task
behavioral1
Sample
Fat32Formatter.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Fat32Formatter.exe
Resource
win10v20201028
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\readme-warning.txt
makop
Targets
-
-
Target
Fat32Formatter.exe
-
Size
286KB
-
MD5
fc080ffd9e95c2d8694a139e84c673ef
-
SHA1
195c3e7ce30b55d52b7e4bdca74613e2c9f7c16b
-
SHA256
c5645239e94a63f672ce815de8a5f11c642ad0fdafe7ab0091807f7e286e3bfd
-
SHA512
c969b8af4169d07653111ab31f4b4b4c5dc9582fe8e2de0e3986e9a5b2eca288751bbe57880b5adb6f2adfb1aac1c254314765abbc18be59877c6d526b2c56a2
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-