General
-
Target
4f74ad60c5ef1bc1812bb54054c459bb7b74dcf0bb9ee6806339fdb42c80f811
-
Size
1.2MB
-
Sample
210505-ltjhsbrzgn
-
MD5
0d7a13128e154b9ca114dcc9f1e395eb
-
SHA1
3af61dd36d84c5e456966ab4548d4203aa85b69d
-
SHA256
4f74ad60c5ef1bc1812bb54054c459bb7b74dcf0bb9ee6806339fdb42c80f811
-
SHA512
48b5c51ac0b5e82c0e13d765b1fc957d8b10c8f6e12aa4c8f88ecb4008889234df33614b804a6447b6986b030a5b6609bc21259ac32f704ad0b34a5827b2feaa
Static task
static1
Behavioral task
behavioral1
Sample
4f74ad60c5ef1bc1812bb54054c459bb7b74dcf0bb9ee6806339fdb42c80f811.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
4f74ad60c5ef1bc1812bb54054c459bb7b74dcf0bb9ee6806339fdb42c80f811.exe
Resource
win10v20210410
Malware Config
Targets
-
-
Target
4f74ad60c5ef1bc1812bb54054c459bb7b74dcf0bb9ee6806339fdb42c80f811
-
Size
1.2MB
-
MD5
0d7a13128e154b9ca114dcc9f1e395eb
-
SHA1
3af61dd36d84c5e456966ab4548d4203aa85b69d
-
SHA256
4f74ad60c5ef1bc1812bb54054c459bb7b74dcf0bb9ee6806339fdb42c80f811
-
SHA512
48b5c51ac0b5e82c0e13d765b1fc957d8b10c8f6e12aa4c8f88ecb4008889234df33614b804a6447b6986b030a5b6609bc21259ac32f704ad0b34a5827b2feaa
Score7/10-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-