General
-
Target
59a7e7d08911df41b3db1c6ef0d515f1bce2cd49320944198ffea3cd51f3e1c4
-
Size
384KB
-
Sample
220213-ppsgqshgh3
-
MD5
4a3d69c28c4742177d6238bc16486f0d
-
SHA1
517b70828d6c203939315d219b28502578620c17
-
SHA256
59a7e7d08911df41b3db1c6ef0d515f1bce2cd49320944198ffea3cd51f3e1c4
-
SHA512
bce9777d4d0536f793d88a7a0266386740469d2fb20f8df9e3b7127c5aeb9fcec32c0c3ae2afc143a6c7cfc7cfd139a65a3a8c3870843a93566e1402ef3e0b31
Static task
static1
Behavioral task
behavioral1
Sample
59a7e7d08911df41b3db1c6ef0d515f1bce2cd49320944198ffea3cd51f3e1c4.msi
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
59a7e7d08911df41b3db1c6ef0d515f1bce2cd49320944198ffea3cd51f3e1c4.msi
Resource
win10v2004-en-20220112
Malware Config
Targets
-
-
Target
59a7e7d08911df41b3db1c6ef0d515f1bce2cd49320944198ffea3cd51f3e1c4
-
Size
384KB
-
MD5
4a3d69c28c4742177d6238bc16486f0d
-
SHA1
517b70828d6c203939315d219b28502578620c17
-
SHA256
59a7e7d08911df41b3db1c6ef0d515f1bce2cd49320944198ffea3cd51f3e1c4
-
SHA512
bce9777d4d0536f793d88a7a0266386740469d2fb20f8df9e3b7127c5aeb9fcec32c0c3ae2afc143a6c7cfc7cfd139a65a3a8c3870843a93566e1402ef3e0b31
Score8/10-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-