General
-
Target
dd.exe
-
Size
82.1MB
-
Sample
210710-thekp6z3ka
-
MD5
9b5aaf2bfe25d830f482b5516471aea3
-
SHA1
442c40f4dd466a643595a40ae1239c89fca6f9ae
-
SHA256
9de171005e8191a70274184c61dcac5e75b6a4307063c740609209da86592f3c
-
SHA512
508322b9d26d55f291d6511103b15dffd9c2230599d51f28c63dfdf9ff6d494a6240fa7daa1b354a051524ea888da6b7b8f03420c4c209ffa734328c10c10b42
Static task
static1
Behavioral task
behavioral1
Sample
dd.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
dd.exe
Resource
win10v20210408
Malware Config
Targets
-
-
Target
dd.exe
-
Size
82.1MB
-
MD5
9b5aaf2bfe25d830f482b5516471aea3
-
SHA1
442c40f4dd466a643595a40ae1239c89fca6f9ae
-
SHA256
9de171005e8191a70274184c61dcac5e75b6a4307063c740609209da86592f3c
-
SHA512
508322b9d26d55f291d6511103b15dffd9c2230599d51f28c63dfdf9ff6d494a6240fa7daa1b354a051524ea888da6b7b8f03420c4c209ffa734328c10c10b42
Score10/10-
Registers COM server for autorun
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-