General
-
Target
peju1
-
Size
840KB
-
Sample
211022-q74hdscfbk
-
MD5
94fa0cf27497a96b3272e8ff5d770f31
-
SHA1
2309adb1980222f4b2c55f3537c4fc9b086aab06
-
SHA256
dc8e3a725389f5825d8e611d28b479a35503a40683a698f48f9fea2426fbd94d
-
SHA512
58d325ec08f7b74bde23397e1f1505f81e98f447e5a310e437976f5deca0b42ee0377cf2f8df182781c793bb6afd64e2767ba690235ca2eae2f74f96f33ad1c0
Static task
static1
Behavioral task
behavioral1
Sample
peju1.dll
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
peju1.dll
Resource
win10-en-20210920
Malware Config
Targets
-
-
Target
peju1
-
Size
840KB
-
MD5
94fa0cf27497a96b3272e8ff5d770f31
-
SHA1
2309adb1980222f4b2c55f3537c4fc9b086aab06
-
SHA256
dc8e3a725389f5825d8e611d28b479a35503a40683a698f48f9fea2426fbd94d
-
SHA512
58d325ec08f7b74bde23397e1f1505f81e98f447e5a310e437976f5deca0b42ee0377cf2f8df182781c793bb6afd64e2767ba690235ca2eae2f74f96f33ad1c0
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Bazar/Team9 Loader payload
-
Suspicious use of SetThreadContext
-