General
-
Target
1884d4a7e597fe560258585106a474c464659864a51ccd6ecd0e245409594dc5
-
Size
858KB
-
Sample
220414-rhg4jabhgq
-
MD5
c2b6fbbc4fcda94fe3eb98afb72f8263
-
SHA1
040ec98f152d0debfaa703cc1e055108da415fbc
-
SHA256
1884d4a7e597fe560258585106a474c464659864a51ccd6ecd0e245409594dc5
-
SHA512
f539dc223290b2112c68511624ca59d9d60d3984796fe090f41f1149202fa74c9dd135725eefede18b35442215692109a039e6e7a078d1278f99a075e170deb0
Static task
static1
Behavioral task
behavioral1
Sample
1884d4a7e597fe560258585106a474c464659864a51ccd6ecd0e245409594dc5.exe
Resource
win7-20220310-en
Malware Config
Extracted
buer
https://gpsdrlow.net/
Targets
-
-
Target
1884d4a7e597fe560258585106a474c464659864a51ccd6ecd0e245409594dc5
-
Size
858KB
-
MD5
c2b6fbbc4fcda94fe3eb98afb72f8263
-
SHA1
040ec98f152d0debfaa703cc1e055108da415fbc
-
SHA256
1884d4a7e597fe560258585106a474c464659864a51ccd6ecd0e245409594dc5
-
SHA512
f539dc223290b2112c68511624ca59d9d60d3984796fe090f41f1149202fa74c9dd135725eefede18b35442215692109a039e6e7a078d1278f99a075e170deb0
-
Drops startup file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-