General
-
Target
mailox.tmp
-
Size
138KB
-
Sample
221110-hg8enahddr
-
MD5
89ecb17e4dd618967b8d31ce34052c2b
-
SHA1
1c2c6d8809bb77ead595fa41faac6b3861df18aa
-
SHA256
b0e2a8c3c5d57571c7892940ab531925a2b0451964afd3035f1293062ca6d64e
-
SHA512
7fa8c7017d8f643943046487ddeff50328db39cd79c6d967e47e788ff0dadc284e34864b4c99bd5b970237e1517e5fb5da4c474cb60f37dfd0c36bcd19855d4c
-
SSDEEP
3072:dQRrmzwR5JrGJNnVUQRrmzwR5JEQRrmzwR5JS:dQxR5JrGRUQxR5JEQxR5JS
Static task
static1
Behavioral task
behavioral1
Sample
mailox.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
mailox.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
mailox.tmp
-
Size
138KB
-
MD5
89ecb17e4dd618967b8d31ce34052c2b
-
SHA1
1c2c6d8809bb77ead595fa41faac6b3861df18aa
-
SHA256
b0e2a8c3c5d57571c7892940ab531925a2b0451964afd3035f1293062ca6d64e
-
SHA512
7fa8c7017d8f643943046487ddeff50328db39cd79c6d967e47e788ff0dadc284e34864b4c99bd5b970237e1517e5fb5da4c474cb60f37dfd0c36bcd19855d4c
-
SSDEEP
3072:dQRrmzwR5JrGJNnVUQRrmzwR5JEQRrmzwR5JS:dQxR5JrGRUQxR5JEQxR5JS
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies boot configuration data using bcdedit
-
Modifies Windows Firewall
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-