General
-
Target
3c1a5b1eebdba993081e6fcf3ea415fc
-
Size
224KB
-
Sample
220726-jcy6vsfbdn
-
MD5
3c1a5b1eebdba993081e6fcf3ea415fc
-
SHA1
5a51b3a2be04f9e75842ad6f534cf54dd03357fb
-
SHA256
92e5e552f3e30774359f76fd596cfe2bc62bfafcd46868756053c5e75254d597
-
SHA512
f60a9e44a7a416b990f4ab94b50b3a87a5675c611dbca9a0fa6edf7d802729415e8e23c8166dcab4501dcd3e14277d309414884deacb12dda4eed5a70be8b3d8
Static task
static1
Behavioral task
behavioral1
Sample
3c1a5b1eebdba993081e6fcf3ea415fc.msi
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
3c1a5b1eebdba993081e6fcf3ea415fc.msi
Resource
win10v2004-20220722-en
Malware Config
Targets
-
-
Target
3c1a5b1eebdba993081e6fcf3ea415fc
-
Size
224KB
-
MD5
3c1a5b1eebdba993081e6fcf3ea415fc
-
SHA1
5a51b3a2be04f9e75842ad6f534cf54dd03357fb
-
SHA256
92e5e552f3e30774359f76fd596cfe2bc62bfafcd46868756053c5e75254d597
-
SHA512
f60a9e44a7a416b990f4ab94b50b3a87a5675c611dbca9a0fa6edf7d802729415e8e23c8166dcab4501dcd3e14277d309414884deacb12dda4eed5a70be8b3d8
Score10/10-
Blocklisted process makes network request
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-