General
-
Target
7766346155.zip
-
Size
191KB
-
Sample
220720-kwxmtadgd2
-
MD5
47e17eb89148fac1b4bbbaff37577e5f
-
SHA1
1566c09fb391f22ce79148edeab0476e71179b7f
-
SHA256
5ffd6e81c8621c99f3b4da51567c5f2493d0ba6a75ab1c2071938aabc3349072
-
SHA512
866644bd58c18c3158549dc886875ae3781e9dac38b204ae044248dc6bbf3729d865363b5ddd2a051b83a6c35abe581ac6f5c61a45ae6a9aff8a35b9cafbf880
Static task
static1
Behavioral task
behavioral1
Sample
7e37d028789ab2b47bcab159da6458da2e8198617b0e7760174e4a0eea07d9c9.msi
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
7e37d028789ab2b47bcab159da6458da2e8198617b0e7760174e4a0eea07d9c9.msi
Resource
win10v2004-20220718-en
Malware Config
Targets
-
-
Target
7e37d028789ab2b47bcab159da6458da2e8198617b0e7760174e4a0eea07d9c9
-
Size
224KB
-
MD5
6892679f8a4b438c582c9954e15acd19
-
SHA1
546bae92165363acd3e0aaef964cc02ec2a2e67d
-
SHA256
7e37d028789ab2b47bcab159da6458da2e8198617b0e7760174e4a0eea07d9c9
-
SHA512
064ece5fe73a356d9078e13134288e144288bd9e9d8d06cdd72f3aaf4cc9d397b5443be67e2d07f78a282d875187a9679e19506ae580d84c9a44142da366f108
Score10/10-
Blocklisted process makes network request
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-