General
-
Target
edf9912bf2c8c7d9048bc6322900231810de7cc34267acc12e1a256fbecdbbdf
-
Size
893KB
-
Sample
210528-zedj8r96b2
-
MD5
8856669b9a76eeb19e5673db6c4491ab
-
SHA1
2d328721640ebb3ddeb971316141fd2b3a84ae84
-
SHA256
edf9912bf2c8c7d9048bc6322900231810de7cc34267acc12e1a256fbecdbbdf
-
SHA512
96af5e42d4aab9ffbe10f4db0e2811d7e00ceebed7ed52b8e679164a92011bfa8eb7c33864be3b3e92358ba3b30ba87bab25cde9ee9163b325a7b542eea621e3
Static task
static1
Behavioral task
behavioral1
Sample
edf9912bf2c8c7d9048bc6322900231810de7cc34267acc12e1a256fbecdbbdf.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
edf9912bf2c8c7d9048bc6322900231810de7cc34267acc12e1a256fbecdbbdf.exe
Resource
win10v20210410
Malware Config
Extracted
\??\c:\teslarvng2.hta
Targets
-
-
Target
edf9912bf2c8c7d9048bc6322900231810de7cc34267acc12e1a256fbecdbbdf
-
Size
893KB
-
MD5
8856669b9a76eeb19e5673db6c4491ab
-
SHA1
2d328721640ebb3ddeb971316141fd2b3a84ae84
-
SHA256
edf9912bf2c8c7d9048bc6322900231810de7cc34267acc12e1a256fbecdbbdf
-
SHA512
96af5e42d4aab9ffbe10f4db0e2811d7e00ceebed7ed52b8e679164a92011bfa8eb7c33864be3b3e92358ba3b30ba87bab25cde9ee9163b325a7b542eea621e3
Score10/10-
Creates new service(s)
-
Stops running service(s)
-
Drops startup file
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-