General
-
Target
e7c36e5ed6e3b409a20ce37d4604efb2d69ba7c146996ca8f1c0c1bcd72e81a0
-
Size
382KB
-
Sample
220213-pn5exahgg7
-
MD5
48a5714147ee85374ab74174a82ab77a
-
SHA1
0013477c69c58afeef76436164a2de0eb29459be
-
SHA256
e7c36e5ed6e3b409a20ce37d4604efb2d69ba7c146996ca8f1c0c1bcd72e81a0
-
SHA512
c3729f30b1140fcd7a28d34689038f3534b5ce7289ae69a18bd6da15374fadb5a76dd47e32c50fbeb81950157dfe75c287e14c7aa61d0e901e0f5326bf93a2ca
Static task
static1
Behavioral task
behavioral1
Sample
e7c36e5ed6e3b409a20ce37d4604efb2d69ba7c146996ca8f1c0c1bcd72e81a0.msi
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
e7c36e5ed6e3b409a20ce37d4604efb2d69ba7c146996ca8f1c0c1bcd72e81a0.msi
Resource
win10v2004-en-20220113
Malware Config
Targets
-
-
Target
e7c36e5ed6e3b409a20ce37d4604efb2d69ba7c146996ca8f1c0c1bcd72e81a0
-
Size
382KB
-
MD5
48a5714147ee85374ab74174a82ab77a
-
SHA1
0013477c69c58afeef76436164a2de0eb29459be
-
SHA256
e7c36e5ed6e3b409a20ce37d4604efb2d69ba7c146996ca8f1c0c1bcd72e81a0
-
SHA512
c3729f30b1140fcd7a28d34689038f3534b5ce7289ae69a18bd6da15374fadb5a76dd47e32c50fbeb81950157dfe75c287e14c7aa61d0e901e0f5326bf93a2ca
Score8/10-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-