General
-
Target
bfca5d2ddd8840dc1f6c49309bbe1924.exe
-
Size
1.1MB
-
Sample
210412-x73cksy4xx
-
MD5
bfca5d2ddd8840dc1f6c49309bbe1924
-
SHA1
b0f0462dfa8fd68617a7e458f9f24586177b3ed2
-
SHA256
ef1bc7566ce113d6af42b9eecc63f0b69b3eeebcc2896d63bf948be6c295dc3a
-
SHA512
8c54c8a7a37c637dc6bde8603433b5da536a796aaccc19e22c1e781a9907e6d891b49bbf051837719ca582f3f1e154851ab82d1a53eb47ab2a882caf3c14dda7
Static task
static1
Behavioral task
behavioral1
Sample
bfca5d2ddd8840dc1f6c49309bbe1924.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
bfca5d2ddd8840dc1f6c49309bbe1924.exe
-
Size
1.1MB
-
MD5
bfca5d2ddd8840dc1f6c49309bbe1924
-
SHA1
b0f0462dfa8fd68617a7e458f9f24586177b3ed2
-
SHA256
ef1bc7566ce113d6af42b9eecc63f0b69b3eeebcc2896d63bf948be6c295dc3a
-
SHA512
8c54c8a7a37c637dc6bde8603433b5da536a796aaccc19e22c1e781a9907e6d891b49bbf051837719ca582f3f1e154851ab82d1a53eb47ab2a882caf3c14dda7
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-