General
-
Target
LoaderFixer.exe
-
Size
17.7MB
-
Sample
230205-f667sagd39
-
MD5
a518234ee9320307559770be505c5da3
-
SHA1
c58f1d5c9718bc340fb3f2a270a9200db29ac339
-
SHA256
d68af7d58d8514cebc01250af1c0fcdeb6142df3320ff34e48280d56d6af37f8
-
SHA512
c89dc340920688af1eb2227bec7a0d7b6d935536b1276cbfb615bcdff1cef5f0089261c9d73b33108494f65cf351ac8e82439466db94a311f8247dde2f4f2659
-
SSDEEP
393216:Lu7L/dWBb+4hQenSyY+k4tOJCEDd/m3pCZkVRiEFT7bfIGy:LCL0N+4XY4tuCEDdKCZkVRiS7kT
Behavioral task
behavioral1
Sample
LoaderFixer.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
LoaderFixer.exe
-
Size
17.7MB
-
MD5
a518234ee9320307559770be505c5da3
-
SHA1
c58f1d5c9718bc340fb3f2a270a9200db29ac339
-
SHA256
d68af7d58d8514cebc01250af1c0fcdeb6142df3320ff34e48280d56d6af37f8
-
SHA512
c89dc340920688af1eb2227bec7a0d7b6d935536b1276cbfb615bcdff1cef5f0089261c9d73b33108494f65cf351ac8e82439466db94a311f8247dde2f4f2659
-
SSDEEP
393216:Lu7L/dWBb+4hQenSyY+k4tOJCEDd/m3pCZkVRiEFT7bfIGy:LCL0N+4XY4tuCEDdKCZkVRiS7kT
Score8/10-
Drops file in Drivers directory
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-