General
-
Target
c1d5e92c34b6361598232917e1e7772610d4df117f0bc242b6e1441f18e12fc9
-
Size
210KB
-
Sample
221124-wxts4abd47
-
MD5
7f3c7768a83ae2c9702c28777d4cccfe
-
SHA1
4d997152c8bafc2f44beefc7501651bd8ba4e33f
-
SHA256
c1d5e92c34b6361598232917e1e7772610d4df117f0bc242b6e1441f18e12fc9
-
SHA512
c92445ba4e05e8527c1d2a313447fce2cbce111d038ff3eccd9c707dba3eebabbb0746035922a76aae619dfc3048f1eee971df81dc78702cea2662697c88f918
-
SSDEEP
6144:IMPkl+7fmc8m4YMSfQBG/zfB79TcyQJSZw6uD8t:IMPkl6fmbUfQBGl7BcyQ3gt
Static task
static1
Behavioral task
behavioral1
Sample
fotoalbum.scr
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fotoalbum.scr
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
fotoalbum.scr
-
Size
320KB
-
MD5
2cbbb949196ecc932278deba7fb10742
-
SHA1
4ac0c2dd88af0d6756762555c8b9f79dcfdb6700
-
SHA256
bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41
-
SHA512
468e858cdecd7e647b660ce2bc45ec0fcc815bfbd455d55fe005bf13a65183b34b4c3560dcdc64164739f6ac18c041c72833144ecc1760bbe48da977f4cbc45d
-
SSDEEP
6144:p/bILVvWfZc2yLENCXUhielTVtyjXP56OS+Is:p0xWfZc2JE8ieXtyjDP/
Score8/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-