General
-
Target
7a9305708f1ecc3b658c1fe02447b24043eefa0722a4707a5868be566793dded
-
Size
510KB
-
Sample
220919-jsmsrsbbgj
-
MD5
a4f3d5892c70b11b24d0ca5d2e9e2abd
-
SHA1
c691d7c4643fd5f85e24568f55a4e3433f5347a8
-
SHA256
7a9305708f1ecc3b658c1fe02447b24043eefa0722a4707a5868be566793dded
-
SHA512
3bfc309d2a44c748a9ff5f321d0bd5ff9c00d4db3abe6f865331c3b51216d7edb072095b630787fa47bc7460208d4f55593d3906a94a1f9bbfaa49ce830eb183
-
SSDEEP
12288:wQDUG2nsZ3yKVy8hPoHb2KpW7ca/q/xKF9IuV0jVjC:wQDWnLKVymw3xxeFORC
Static task
static1
Behavioral task
behavioral1
Sample
SnowFairy.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SnowFairy.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
SnowFairy.exe
-
Size
593KB
-
MD5
651c7c49229bbc97eb1dd9f48a27cda3
-
SHA1
bd8099af11fc1541be14207b1639d90be5c65b48
-
SHA256
ca4f28bc4a5e54afb96d2b5191afc15fb8f4ba25b9b8e85fbfe52d251de2854e
-
SHA512
96699af311fd025596e7bf97a57f63dcfa9e3ccdc53e7598e7a59496e14f6bf2df1dbbdc6c3f0b3632c6edfe5f5d0cefb423ab4a4668867596c5567055664bdc
-
SSDEEP
12288:36pTX5CA23yiby85poHb2KNW7cC/6/fKF9AuV0jDf:qhpC4iby0CfRfeRO3
Score10/10-
Modifies firewall policy service
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-