General
-
Target
964fbbc3b3a80e3e378e88f8c523d72e539ba06e46643ed212bc0609871fff4e.zip
-
Size
5.9MB
-
Sample
230114-wzkm7sbf58
-
MD5
3b556c0f6f1d44395c17f70567e78c47
-
SHA1
fbe5774fc4f3eaecf8337b26f43b2d95880489cd
-
SHA256
4a48666773f2f011d86768b3cbabe56f9683a4a9243f510d9ed76b6a12addb59
-
SHA512
b4bada1fe9ff6c7a9671e1d47220f7d2ca87e630bdfa96fa6a97fbcfac1480da807e65a72c004f74d506e674e8baeda4a97452c2338d115ae5de6dedfc721906
-
SSDEEP
98304:ZP0uCwITUXu/ArmWHGKcjEgKVdYuXKLSfLK2MjGLXyRMkI4HiMlQSiBm:6RAXxjHGKcjEgKV8LSfLK2yszkP
Static task
static1
Behavioral task
behavioral1
Sample
964fbbc3b3a80e3e378e88f8c523d72e539ba06e46643ed212bc0609871fff4e.msi
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
964fbbc3b3a80e3e378e88f8c523d72e539ba06e46643ed212bc0609871fff4e.msi
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
964fbbc3b3a80e3e378e88f8c523d72e539ba06e46643ed212bc0609871fff4e.msi
-
Size
6.6MB
-
MD5
0bd958b0c88d3614f563ea50f97c2121
-
SHA1
d8a86ab60b4807600f227a744c814baa03eac396
-
SHA256
964fbbc3b3a80e3e378e88f8c523d72e539ba06e46643ed212bc0609871fff4e
-
SHA512
01853db3bc1ce3a3827c8473ea15cc24321dc3b114b3301d3932a3c49cf6d46e5455cf452380c2c8392b9debf825c3a1647ca9116b76d1ee343b7d3baa9cb91f
-
SSDEEP
196608:9N92ovsFoCcBkDr1vAH/MjVPJtvuelsDDWWe:9N92+Mo44kNznaWWe
Score8/10-
Blocklisted process makes network request
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-