General
-
Target
cb3d42cb0a374cded8d38f8403df22170689a5e196c98186d10495e60a798837
-
Size
47KB
-
Sample
211207-q2rxeahgem
-
MD5
aa0b8e24edeca2b1e3a0e6c9961af43b
-
SHA1
c17a74e43ff4bc489d0f396cc56a2d3eaee36ea9
-
SHA256
cb3d42cb0a374cded8d38f8403df22170689a5e196c98186d10495e60a798837
-
SHA512
35ed920b3e6e46468b034894424e97deadad44c2c7ae12361183912cf51a4cfa3866980edefe1e0c44c1748106bf974f243512bc3a8445f34816f871abf50cee
Static task
static1
Behavioral task
behavioral1
Sample
cb3d42cb0a374cded8d38f8403df22170689a5e196c98186d10495e60a798837.exe
Resource
win10-en-20211014
Malware Config
Extracted
http://haohm.502ok.com/hm
Targets
-
-
Target
cb3d42cb0a374cded8d38f8403df22170689a5e196c98186d10495e60a798837
-
Size
47KB
-
MD5
aa0b8e24edeca2b1e3a0e6c9961af43b
-
SHA1
c17a74e43ff4bc489d0f396cc56a2d3eaee36ea9
-
SHA256
cb3d42cb0a374cded8d38f8403df22170689a5e196c98186d10495e60a798837
-
SHA512
35ed920b3e6e46468b034894424e97deadad44c2c7ae12361183912cf51a4cfa3866980edefe1e0c44c1748106bf974f243512bc3a8445f34816f871abf50cee
Score10/10-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-