General
-
Target
9528a97d8d73b0dbed2ac496991f0a2eecc5a857d22e994d227ae7c3bef7296f
-
Size
666KB
-
Sample
220228-dvmynaeeam
-
MD5
7910a78498cb7953b1c0db2ef4f8db27
-
SHA1
8f61608330261c1d5214f5d19f98b4d64f51ac12
-
SHA256
9528a97d8d73b0dbed2ac496991f0a2eecc5a857d22e994d227ae7c3bef7296f
-
SHA512
fd60d2c922c58906065816d347faf484a7ebfde81e354ca387dffbaf40f07c2ffae7884b702cf709b2f91468848ac132ba3310ec1f081cf1c363c8dea9bc4b7e
Static task
static1
Behavioral task
behavioral1
Sample
9528a97d8d73b0dbed2ac496991f0a2eecc5a857d22e994d227ae7c3bef7296f.exe
Resource
win7-20220223-en
Malware Config
Targets
-
-
Target
9528a97d8d73b0dbed2ac496991f0a2eecc5a857d22e994d227ae7c3bef7296f
-
Size
666KB
-
MD5
7910a78498cb7953b1c0db2ef4f8db27
-
SHA1
8f61608330261c1d5214f5d19f98b4d64f51ac12
-
SHA256
9528a97d8d73b0dbed2ac496991f0a2eecc5a857d22e994d227ae7c3bef7296f
-
SHA512
fd60d2c922c58906065816d347faf484a7ebfde81e354ca387dffbaf40f07c2ffae7884b702cf709b2f91468848ac132ba3310ec1f081cf1c363c8dea9bc4b7e
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-