General
-
Target
05e0449cdec92517550791d8024f8a297b1a447dbcbd00908d78be8696360177
-
Size
621KB
-
Sample
230301-q3wa8agd57
-
MD5
f1431899005a9b9758c9c1f912d65e45
-
SHA1
3ebb66d5ff5b93311767faf3a161f7c07f11abaf
-
SHA256
05e0449cdec92517550791d8024f8a297b1a447dbcbd00908d78be8696360177
-
SHA512
13c06f02b52b2ef31f21d6f7a44cc6bf170bbc2fdc41076be447ce65fcc767322085aa3a52444d7c0582ef796925b493623d65422c165630e60cf29c694755e4
-
SSDEEP
6144:tjSO819X2yfwbS/ZCswouPe2vif6JmbPEjuQMyWfsYg4Lab:YO81F6+UswS2v26JmLNY83g4e
Static task
static1
Behavioral task
behavioral1
Sample
05e0449cdec92517550791d8024f8a297b1a447dbcbd00908d78be8696360177.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
05e0449cdec92517550791d8024f8a297b1a447dbcbd00908d78be8696360177
-
Size
621KB
-
MD5
f1431899005a9b9758c9c1f912d65e45
-
SHA1
3ebb66d5ff5b93311767faf3a161f7c07f11abaf
-
SHA256
05e0449cdec92517550791d8024f8a297b1a447dbcbd00908d78be8696360177
-
SHA512
13c06f02b52b2ef31f21d6f7a44cc6bf170bbc2fdc41076be447ce65fcc767322085aa3a52444d7c0582ef796925b493623d65422c165630e60cf29c694755e4
-
SSDEEP
6144:tjSO819X2yfwbS/ZCswouPe2vif6JmbPEjuQMyWfsYg4Lab:YO81F6+UswS2v26JmLNY83g4e
-
Detect Blackmoon payload
-
Gh0st RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-