General
-
Target
file.exe
-
Size
710KB
-
Sample
230118-gw2pzsfe41
-
MD5
8536f1680e65cb9b9e93fa916d2ae93b
-
SHA1
2eb995c3da87f07fcbfb48008afbf3253ea86e76
-
SHA256
70c0eab50ed39298ca6961b54dff822adde204067d84d1783f7d1b88ebbfe360
-
SHA512
7a34ec0fdfe7977bfbd07b2041172155d32019910801e8cf0c60a64c1d0a50dc2f1f6c028507039b5fca71575475f5f060d10931458f1518613ad332282c4ec7
-
SSDEEP
12288:ErIIpwFjtUQ0RlPdPd64bRZUDNVR9WnsGJxoeM4:ErIKQtUpfVPd6A/UjunLJxoC
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
file.exe
-
Size
710KB
-
MD5
8536f1680e65cb9b9e93fa916d2ae93b
-
SHA1
2eb995c3da87f07fcbfb48008afbf3253ea86e76
-
SHA256
70c0eab50ed39298ca6961b54dff822adde204067d84d1783f7d1b88ebbfe360
-
SHA512
7a34ec0fdfe7977bfbd07b2041172155d32019910801e8cf0c60a64c1d0a50dc2f1f6c028507039b5fca71575475f5f060d10931458f1518613ad332282c4ec7
-
SSDEEP
12288:ErIIpwFjtUQ0RlPdPd64bRZUDNVR9WnsGJxoeM4:ErIKQtUpfVPd6A/UjunLJxoC
Score10/10-
Detects LgoogLoader payload
-
LgoogLoader
A downloader capable of dropping and executing other malware families.
-
Sets service image path in registry
-
Suspicious use of SetThreadContext
-