General
-
Target
Kylepono.exe
-
Size
3.2MB
-
Sample
210802-w5yc3bv79x
-
MD5
cd2eb880ecbad847cb6205a42708e5e4
-
SHA1
aadaba5e4d887136cbcb3df0a4dc0eb94f391585
-
SHA256
001405ded84e227092bafe165117888d423719d7d75554025ec410d1d6558925
-
SHA512
b0591d6e4181275001fdefb70e04bdeb1b241dc696a887f36375826904bc164714bfe5d0b86e39952f877309571b9a0212ca5e5f122c6393cb17a797b0c2f8b2
Static task
static1
Behavioral task
behavioral1
Sample
Kylepono.exe
Resource
win7v20210408
Malware Config
Extracted
rustybuer
https://vesupyny.com/
Targets
-
-
Target
Kylepono.exe
-
Size
3.2MB
-
MD5
cd2eb880ecbad847cb6205a42708e5e4
-
SHA1
aadaba5e4d887136cbcb3df0a4dc0eb94f391585
-
SHA256
001405ded84e227092bafe165117888d423719d7d75554025ec410d1d6558925
-
SHA512
b0591d6e4181275001fdefb70e04bdeb1b241dc696a887f36375826904bc164714bfe5d0b86e39952f877309571b9a0212ca5e5f122c6393cb17a797b0c2f8b2
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-