General
-
Target
b615e085031fb93ff21a0b0e743cc92e0e8f4dd4b58c02e557ed0ad116bd1784
-
Size
1.6MB
-
Sample
220525-appzaaggel
-
MD5
bf60b20442eb074a2b0b0b9f410aa40b
-
SHA1
679f886dc3613225c9238eb36669402f60f1ae85
-
SHA256
b615e085031fb93ff21a0b0e743cc92e0e8f4dd4b58c02e557ed0ad116bd1784
-
SHA512
81e669cfb677b25116d45b4f0e6341c611a3d56ee46cd019d6e5d8ef9daaf1f4cfeb0e4997032128b1af99ef93f9b81f4cd0026e5a11fdab5d73e4d98801c8b5
Static task
static1
Behavioral task
behavioral1
Sample
b615e085031fb93ff21a0b0e743cc92e0e8f4dd4b58c02e557ed0ad116bd1784.exe
Resource
win7-20220414-en
Malware Config
Targets
-
-
Target
b615e085031fb93ff21a0b0e743cc92e0e8f4dd4b58c02e557ed0ad116bd1784
-
Size
1.6MB
-
MD5
bf60b20442eb074a2b0b0b9f410aa40b
-
SHA1
679f886dc3613225c9238eb36669402f60f1ae85
-
SHA256
b615e085031fb93ff21a0b0e743cc92e0e8f4dd4b58c02e557ed0ad116bd1784
-
SHA512
81e669cfb677b25116d45b4f0e6341c611a3d56ee46cd019d6e5d8ef9daaf1f4cfeb0e4997032128b1af99ef93f9b81f4cd0026e5a11fdab5d73e4d98801c8b5
-
suricata: ET MALWARE Possible Windows executable sent when remote host claims to send a Text File
suricata: ET MALWARE Possible Windows executable sent when remote host claims to send a Text File
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Loads dropped DLL
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-