General
-
Target
3f7b0d15f4cbe63e57fb06b57575bf6dd9eb777c737b0886250166768169fc6c
-
Size
598KB
-
Sample
220228-dprpnaeden
-
MD5
45abce50a00d40dff21edb7264824758
-
SHA1
0861d2abbcf16bf6394dc7aadd341b348a3c8c4d
-
SHA256
3f7b0d15f4cbe63e57fb06b57575bf6dd9eb777c737b0886250166768169fc6c
-
SHA512
7097f34634f716609bc4bbe27af511a9fec24c555c25c22e712f3ce019b471328226030bb2939692f36a81cc24de105670b263d0fb7036375e60c8ddaee2a8f6
Static task
static1
Behavioral task
behavioral1
Sample
3f7b0d15f4cbe63e57fb06b57575bf6dd9eb777c737b0886250166768169fc6c.exe
Resource
win7-20220223-en
Malware Config
Targets
-
-
Target
3f7b0d15f4cbe63e57fb06b57575bf6dd9eb777c737b0886250166768169fc6c
-
Size
598KB
-
MD5
45abce50a00d40dff21edb7264824758
-
SHA1
0861d2abbcf16bf6394dc7aadd341b348a3c8c4d
-
SHA256
3f7b0d15f4cbe63e57fb06b57575bf6dd9eb777c737b0886250166768169fc6c
-
SHA512
7097f34634f716609bc4bbe27af511a9fec24c555c25c22e712f3ce019b471328226030bb2939692f36a81cc24de105670b263d0fb7036375e60c8ddaee2a8f6
-
OutSteel batch script
Detects batch script dropped by OutSteel
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Deletes itself
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-