General
-
Target
9777874f5aa4f3b1bc3a9337b0fb136b35d63d5c6cbfd01d7aa30b2c0c6f1c58
-
Size
313KB
-
Sample
221123-jx7nqsgc24
-
MD5
bcb7f11f81d842a3588abe800b54a2f9
-
SHA1
a2efa9f08ecee2592cf73496dbc760e82c4dfaba
-
SHA256
9777874f5aa4f3b1bc3a9337b0fb136b35d63d5c6cbfd01d7aa30b2c0c6f1c58
-
SHA512
30caf57fa06ef728f3e14f733f7e1c155ce86da47e2c20f185c7fb6a5786e8cb9f6df7233cc6b6afacc06c4bb0d8a62a2571bf33bf5721792ef093eb28578552
-
SSDEEP
6144:0rJ9uEo2S1YnQmCX492DkwNP3qpYFkwlWKM23DpJQ+JXUOy1Lr3Dv1A+CiyGdUzA:0rfu6/eIo4XwlWKM231t5UnRr3DdRp5p
Static task
static1
Behavioral task
behavioral1
Sample
9777874f5aa4f3b1bc3a9337b0fb136b35d63d5c6cbfd01d7aa30b2c0c6f1c58.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9777874f5aa4f3b1bc3a9337b0fb136b35d63d5c6cbfd01d7aa30b2c0c6f1c58.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
9777874f5aa4f3b1bc3a9337b0fb136b35d63d5c6cbfd01d7aa30b2c0c6f1c58
-
Size
313KB
-
MD5
bcb7f11f81d842a3588abe800b54a2f9
-
SHA1
a2efa9f08ecee2592cf73496dbc760e82c4dfaba
-
SHA256
9777874f5aa4f3b1bc3a9337b0fb136b35d63d5c6cbfd01d7aa30b2c0c6f1c58
-
SHA512
30caf57fa06ef728f3e14f733f7e1c155ce86da47e2c20f185c7fb6a5786e8cb9f6df7233cc6b6afacc06c4bb0d8a62a2571bf33bf5721792ef093eb28578552
-
SSDEEP
6144:0rJ9uEo2S1YnQmCX492DkwNP3qpYFkwlWKM23DpJQ+JXUOy1Lr3Dv1A+CiyGdUzA:0rfu6/eIo4XwlWKM231t5UnRr3DdRp5p
Score7/10-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-