General
-
Target
90f613caa131c663e32aabc31b5fccc99edcfa874110d51cd627531d3a67b16d
-
Size
382KB
-
Sample
220213-ppkf5ahgg9
-
MD5
63bed40e369b76379b47818ba912ee43
-
SHA1
11c72a1239ffe8b6bcd2f5418c369b044f3bfc4a
-
SHA256
90f613caa131c663e32aabc31b5fccc99edcfa874110d51cd627531d3a67b16d
-
SHA512
aa1be6812f84d8cf205cac1878d8eca1c3d345d7807e3804b6814028b74b3355fd68b90f804b3973ef40aac8bc6d395fa4063b1aca23e9394d0aa74a551f5174
Static task
static1
Behavioral task
behavioral1
Sample
90f613caa131c663e32aabc31b5fccc99edcfa874110d51cd627531d3a67b16d.msi
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
90f613caa131c663e32aabc31b5fccc99edcfa874110d51cd627531d3a67b16d.msi
Resource
win10v2004-en-20220113
Malware Config
Targets
-
-
Target
90f613caa131c663e32aabc31b5fccc99edcfa874110d51cd627531d3a67b16d
-
Size
382KB
-
MD5
63bed40e369b76379b47818ba912ee43
-
SHA1
11c72a1239ffe8b6bcd2f5418c369b044f3bfc4a
-
SHA256
90f613caa131c663e32aabc31b5fccc99edcfa874110d51cd627531d3a67b16d
-
SHA512
aa1be6812f84d8cf205cac1878d8eca1c3d345d7807e3804b6814028b74b3355fd68b90f804b3973ef40aac8bc6d395fa4063b1aca23e9394d0aa74a551f5174
Score8/10-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-