General
-
Target
c1e3d816f6ff804ab7a2d8213699b6a365ff4635b7b6b284519385cc819c51a7.sample
-
Size
9.6MB
-
Sample
210726-hz143cgykn
-
MD5
0042a6b62bf6332b034ab29afcb12297
-
SHA1
87b5af627e5a752f7009501ef183d6bcf024670d
-
SHA256
c1e3d816f6ff804ab7a2d8213699b6a365ff4635b7b6b284519385cc819c51a7
-
SHA512
00e2101953db9059115bbdbabeccff8dbb85473e8bdf263b70f371d0d47952729b64391adbadb561658ae9e974579a2822a97005cfe01667a8a5601def3e0030
Static task
static1
Behavioral task
behavioral1
Sample
c1e3d816f6ff804ab7a2d8213699b6a365ff4635b7b6b284519385cc819c51a7.sample.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
c1e3d816f6ff804ab7a2d8213699b6a365ff4635b7b6b284519385cc819c51a7.sample.exe
Resource
win10v20210410
Malware Config
Extracted
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\!_READ_ME_!.txt
saveinfo89@yahoo.com
3B8A55E5E52A0CE7BFC3A1309AE1DD48B0868C91
3F8E95F54A36F326E1F2C2AEB51796D11211BB84
Extracted
C:\odt\!_READ_ME_!.txt
decrypt482@yahoo.com
3AF2A2199CAB734F44D7908DC8AA10E446A6C3A9
Targets
-
-
Target
c1e3d816f6ff804ab7a2d8213699b6a365ff4635b7b6b284519385cc819c51a7.sample
-
Size
9.6MB
-
MD5
0042a6b62bf6332b034ab29afcb12297
-
SHA1
87b5af627e5a752f7009501ef183d6bcf024670d
-
SHA256
c1e3d816f6ff804ab7a2d8213699b6a365ff4635b7b6b284519385cc819c51a7
-
SHA512
00e2101953db9059115bbdbabeccff8dbb85473e8bdf263b70f371d0d47952729b64391adbadb561658ae9e974579a2822a97005cfe01667a8a5601def3e0030
Score10/10-
Deletes itself
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-