General
-
Target
680e418e349d611812a6afd357c39fa4fe3baf32cd95012f9b0632a364f2f349
-
Size
328KB
-
Sample
211001-tdjgxacagp
-
MD5
759e5f4dbc7432a87a19bcff1ae50ab7
-
SHA1
2502825181f4b8c13461ba2002cea0e2b3511136
-
SHA256
680e418e349d611812a6afd357c39fa4fe3baf32cd95012f9b0632a364f2f349
-
SHA512
a9f304bc605f8806dbfbc33081e96883c11af9e5dd53068393ba00440c916c3f8f11c583fd10993a47ac282b14674c028484bf71497174601ff812f2e94d8abf
Static task
static1
Malware Config
Targets
-
-
Target
680e418e349d611812a6afd357c39fa4fe3baf32cd95012f9b0632a364f2f349
-
Size
328KB
-
MD5
759e5f4dbc7432a87a19bcff1ae50ab7
-
SHA1
2502825181f4b8c13461ba2002cea0e2b3511136
-
SHA256
680e418e349d611812a6afd357c39fa4fe3baf32cd95012f9b0632a364f2f349
-
SHA512
a9f304bc605f8806dbfbc33081e96883c11af9e5dd53068393ba00440c916c3f8f11c583fd10993a47ac282b14674c028484bf71497174601ff812f2e94d8abf
-
Executes dropped EXE
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-