General
-
Target
dc119b46e9b9ac1978b148f7e910032b5cd969af7c289a4e9f7778d346ae74be
-
Size
146KB
-
Sample
230222-csn79she34
-
MD5
02d8468b20978fe1a72baf45f901a04c
-
SHA1
5beb1e105c3467f54604cba5652a8834d8d77ad9
-
SHA256
dc119b46e9b9ac1978b148f7e910032b5cd969af7c289a4e9f7778d346ae74be
-
SHA512
dfaeccc14b2df75e77ca5e1fec79714048ae659211cb44634f81253416b325578b64d768b38f5213babf899c4b0f8c05e81ef7bf3c7c41e49ef90cc4652f6fcc
-
SSDEEP
3072:woMYxYmFlZcCcKHsoseJYd72cGqnbdB2vN2V:woMtylZcdKM5ek6c7nbdUvNW
Behavioral task
behavioral1
Sample
dc119b46e9b9ac1978b148f7e910032b5cd969af7c289a4e9f7778d346ae74be.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
dc119b46e9b9ac1978b148f7e910032b5cd969af7c289a4e9f7778d346ae74be
-
Size
146KB
-
MD5
02d8468b20978fe1a72baf45f901a04c
-
SHA1
5beb1e105c3467f54604cba5652a8834d8d77ad9
-
SHA256
dc119b46e9b9ac1978b148f7e910032b5cd969af7c289a4e9f7778d346ae74be
-
SHA512
dfaeccc14b2df75e77ca5e1fec79714048ae659211cb44634f81253416b325578b64d768b38f5213babf899c4b0f8c05e81ef7bf3c7c41e49ef90cc4652f6fcc
-
SSDEEP
3072:woMYxYmFlZcCcKHsoseJYd72cGqnbdB2vN2V:woMtylZcdKM5ek6c7nbdUvNW
-
Detect Blackmoon payload
-
Gh0st RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-