General
-
Target
b593b06c046cac84d19903bb4f253da8cbd6bfa2a0601459c15f0f7c0d1c42c9
-
Size
682KB
-
Sample
230314-evh55sfd2x
-
MD5
7562211a68b8c6410156a404fdde44da
-
SHA1
3a102d31ea2e1056712de3e8a195dae6cb986d03
-
SHA256
b593b06c046cac84d19903bb4f253da8cbd6bfa2a0601459c15f0f7c0d1c42c9
-
SHA512
c6feca2a099c6a511bf9721fc334569b313f6d57ed8dec38a64c7ce28b3fea8450ba98fe15d970fe4b9b606a2ecf873d0012dd45a29a61a8f5562b7cc45ece49
-
SSDEEP
12288:ISYfFx0mgDpkZLtU5K3+9KpdS+grSSHnaoRB4JyVDMXt:n4FxJtZxU5BCdS+vkr1VDM
Static task
static1
Behavioral task
behavioral1
Sample
b593b06c046cac84d19903bb4f253da8cbd6bfa2a0601459c15f0f7c0d1c42c9.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
b593b06c046cac84d19903bb4f253da8cbd6bfa2a0601459c15f0f7c0d1c42c9
-
Size
682KB
-
MD5
7562211a68b8c6410156a404fdde44da
-
SHA1
3a102d31ea2e1056712de3e8a195dae6cb986d03
-
SHA256
b593b06c046cac84d19903bb4f253da8cbd6bfa2a0601459c15f0f7c0d1c42c9
-
SHA512
c6feca2a099c6a511bf9721fc334569b313f6d57ed8dec38a64c7ce28b3fea8450ba98fe15d970fe4b9b606a2ecf873d0012dd45a29a61a8f5562b7cc45ece49
-
SSDEEP
12288:ISYfFx0mgDpkZLtU5K3+9KpdS+grSSHnaoRB4JyVDMXt:n4FxJtZxU5BCdS+vkr1VDM
-
Detect Blackmoon payload
-
Gh0st RAT payload
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-