General
-
Target
bomani2.exe
-
Size
56KB
-
Sample
220330-ky21bafbdq
-
MD5
cadf573e4ca120639a1e5484e985938d
-
SHA1
ff0d09efbb1495982073291351a81de59e2c3c0d
-
SHA256
7375b2047d519fffcbe1191522efbf73dcda6073a4fc9b77f01f009c437a2fe8
-
SHA512
a8496afe762828b23f3568c49954a7c84c2390e0b2d2bb54c141fa9af2db390fd1f0a7582a006ed2b315fd074e4a2268bfdc52a1923f1a28e706000db92015ef
Static task
static1
Behavioral task
behavioral1
Sample
bomani2.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
bomani2.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\Users\Public\Desktop\Read Me!.hTa
Extracted
C:\Users\Admin\Desktop\Read Me!.hTa
Targets
-
-
Target
bomani2.exe
-
Size
56KB
-
MD5
cadf573e4ca120639a1e5484e985938d
-
SHA1
ff0d09efbb1495982073291351a81de59e2c3c0d
-
SHA256
7375b2047d519fffcbe1191522efbf73dcda6073a4fc9b77f01f009c437a2fe8
-
SHA512
a8496afe762828b23f3568c49954a7c84c2390e0b2d2bb54c141fa9af2db390fd1f0a7582a006ed2b315fd074e4a2268bfdc52a1923f1a28e706000db92015ef
Score10/10-
Blocklisted process makes network request
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Sets desktop wallpaper using registry
-