General
-
Target
info.zip
-
Size
3.4MB
-
Sample
210525-pym71tsy36
-
MD5
c3c561c20e48169f4906c6b0b135984b
-
SHA1
aae73c86309c9198e8cc794f5dd3b1899f61e60d
-
SHA256
b914abc696286a639a847d2e3a4a36ff682f30a87b08c4ffc61f2e0cf5e7ec5f
-
SHA512
2cf8e28faedb11009196510b00e82b682474edaf637019bdd6164b08ebbec39e6ef6cfcfbdfc1baa18bef3fb799bf5f90a2ce4ce8edac52d34af6f1013c96653
Static task
static1
Behavioral task
behavioral1
Sample
IMG001.scr
Resource
win7v20210410
Behavioral task
behavioral2
Sample
IMG001.scr
Resource
win10v20210410
Malware Config
Targets
-
-
Target
IMG001.scr
-
Size
3.4MB
-
MD5
fbbcf1e9501234d6661a0c9ae6dc01c9
-
SHA1
1ca9759a324159f331e79ea6871ad62040521b41
-
SHA256
d9901b16a93aad709947524379d572a7a7bf8e2741e27a1112c95977d4a6ea8c
-
SHA512
027e5ea6d92955b87439f61704de5b3e21c7a8e0a95327868951968e4f5cbed59cf1e803ac9adb2c9cf577db7a2f6fd4383b7384d57a78596cfb2ff020907140
Score8/10-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-