General
-
Target
dbf89ed9aa372d036bc920015ee9dc322dee5aba82c44f6d889c31365f040ab6
-
Size
210KB
-
Sample
221124-wxwbxsbd49
-
MD5
7dfc8cbde39151e5e65ee6913f832f60
-
SHA1
772e0614c7fdb5acf684df3c3493530d96713a02
-
SHA256
dbf89ed9aa372d036bc920015ee9dc322dee5aba82c44f6d889c31365f040ab6
-
SHA512
0d260dd32a7431ed39a8a9d4acc71ea7d72bc123e34198358768c8cf07c4ad01866cc46d497e34e2ba52d9351fc4d81280aed95d18c56e2ca5ae6af31b7c3e51
-
SSDEEP
6144:NMPkl+1fmc8m4YM2fQBs/zfBb9TcyQRSZwHPD:NMPklCfmb8fQBslbBcyQRPD
Static task
static1
Behavioral task
behavioral1
Sample
fotoalbum.scr
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fotoalbum.scr
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
fotoalbum.scr
-
Size
320KB
-
MD5
2cbbb949196ecc932278deba7fb10742
-
SHA1
4ac0c2dd88af0d6756762555c8b9f79dcfdb6700
-
SHA256
bb287b5d3a5b8a8f0ae1f605950ad0c8c1e155a5b8e9912d47eb945a9887ea41
-
SHA512
468e858cdecd7e647b660ce2bc45ec0fcc815bfbd455d55fe005bf13a65183b34b4c3560dcdc64164739f6ac18c041c72833144ecc1760bbe48da977f4cbc45d
-
SSDEEP
6144:p/bILVvWfZc2yLENCXUhielTVtyjXP56OS+Is:p0xWfZc2JE8ieXtyjDP/
Score8/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-