General
-
Target
05036d5462ca70ebd709ba9218f07ff16a8d5cfa33dbf19b8407fff404df9581
-
Size
382KB
-
Sample
220213-pp1s4shgh5
-
MD5
a49c0e0d1ca8a829a8175a3931e5cba1
-
SHA1
efa1b8275c6b1b1b7a5a21ecab8aec9f0fbea6f1
-
SHA256
05036d5462ca70ebd709ba9218f07ff16a8d5cfa33dbf19b8407fff404df9581
-
SHA512
50e036a03741c8465d38b66d3d27741f2f1f580cd0c54daeac254b2ada3b1d3d21310f9a522f2606e01943401d7756ac976e95e8b444712008109ccc756a80b2
Static task
static1
Behavioral task
behavioral1
Sample
05036d5462ca70ebd709ba9218f07ff16a8d5cfa33dbf19b8407fff404df9581.msi
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
05036d5462ca70ebd709ba9218f07ff16a8d5cfa33dbf19b8407fff404df9581.msi
Resource
win10v2004-en-20220113
Malware Config
Targets
-
-
Target
05036d5462ca70ebd709ba9218f07ff16a8d5cfa33dbf19b8407fff404df9581
-
Size
382KB
-
MD5
a49c0e0d1ca8a829a8175a3931e5cba1
-
SHA1
efa1b8275c6b1b1b7a5a21ecab8aec9f0fbea6f1
-
SHA256
05036d5462ca70ebd709ba9218f07ff16a8d5cfa33dbf19b8407fff404df9581
-
SHA512
50e036a03741c8465d38b66d3d27741f2f1f580cd0c54daeac254b2ada3b1d3d21310f9a522f2606e01943401d7756ac976e95e8b444712008109ccc756a80b2
Score8/10-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-