General
-
Target
b6fb293632608978b34f2af759b51ff3ecd198eb495de43a0b845dceed513efc
-
Size
169KB
-
Sample
220523-3rhxzahha9
-
MD5
685f862334215b121715934b95732bdf
-
SHA1
dd83f5aea31e34b2d4a395741eef45749afc33b6
-
SHA256
b6fb293632608978b34f2af759b51ff3ecd198eb495de43a0b845dceed513efc
-
SHA512
d56e2aa73d396ba551325dc9ebd29275696104f5a170bfbbdc320ec6c84c66f7efbc3b9178782f582e029c044948de24b6a850521fd866460efafaac4cd09b9e
Static task
static1
Behavioral task
behavioral1
Sample
b6fb293632608978b34f2af759b51ff3ecd198eb495de43a0b845dceed513efc.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
b6fb293632608978b34f2af759b51ff3ecd198eb495de43a0b845dceed513efc.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
buer
https://gstatiknetiplist.cc/
https://gstatiknetiplist.com/
Targets
-
-
Target
b6fb293632608978b34f2af759b51ff3ecd198eb495de43a0b845dceed513efc
-
Size
169KB
-
MD5
685f862334215b121715934b95732bdf
-
SHA1
dd83f5aea31e34b2d4a395741eef45749afc33b6
-
SHA256
b6fb293632608978b34f2af759b51ff3ecd198eb495de43a0b845dceed513efc
-
SHA512
d56e2aa73d396ba551325dc9ebd29275696104f5a170bfbbdc320ec6c84c66f7efbc3b9178782f582e029c044948de24b6a850521fd866460efafaac4cd09b9e
Score10/10-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-