General
-
Target
b8ce958f56087c6cd55fa2131a1cd3256063e7c73adf36af313054b0f17b7b43
-
Size
634KB
-
Sample
220228-dv2f2sdac6
-
MD5
d4fa9c88bd43d2b9bcb66c3e7292b52a
-
SHA1
5cf627b7cc836506958a5e04e902f8530cdb58b6
-
SHA256
b8ce958f56087c6cd55fa2131a1cd3256063e7c73adf36af313054b0f17b7b43
-
SHA512
2088445e2dd2e9497c97acb7ad426536c2d190014702fd4c77193193db42cedbb9dcae918e37ce4161393a4043f36e76ff2947e0276fe4647b38478725d03919
Static task
static1
Behavioral task
behavioral1
Sample
b8ce958f56087c6cd55fa2131a1cd3256063e7c73adf36af313054b0f17b7b43.exe
Resource
win7-en-20211208
Malware Config
Targets
-
-
Target
b8ce958f56087c6cd55fa2131a1cd3256063e7c73adf36af313054b0f17b7b43
-
Size
634KB
-
MD5
d4fa9c88bd43d2b9bcb66c3e7292b52a
-
SHA1
5cf627b7cc836506958a5e04e902f8530cdb58b6
-
SHA256
b8ce958f56087c6cd55fa2131a1cd3256063e7c73adf36af313054b0f17b7b43
-
SHA512
2088445e2dd2e9497c97acb7ad426536c2d190014702fd4c77193193db42cedbb9dcae918e37ce4161393a4043f36e76ff2947e0276fe4647b38478725d03919
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-