General
-
Target
17231e7ba7d04967bda15e169008982936599103cd9c01c5691402e0d6c25489
-
Size
324KB
-
Sample
230314-ew2nwafd4w
-
MD5
1c22fa80322fd53bae02ed3e7524fc0c
-
SHA1
466acd7212820c57379fd830f83d9419810d2ba0
-
SHA256
17231e7ba7d04967bda15e169008982936599103cd9c01c5691402e0d6c25489
-
SHA512
e4fe4b0f80a96d5ec474e7f12a6fb7ab5ae5fefc6b75fcbf5ba7c9fb4e3baeb40bfc0c8605a0d84f3cf961be47fff38ff026e608f0868d89fba0dc414f51b461
-
SSDEEP
6144:x303mYR98V8WvmSbW63MQJyCZc2fZvQ11/N7gTZAAypRVzspp627gQG:23mQ8zeSd3fYdOy/mWX7682bG
Static task
static1
Behavioral task
behavioral1
Sample
17231e7ba7d04967bda15e169008982936599103cd9c01c5691402e0d6c25489.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
17231e7ba7d04967bda15e169008982936599103cd9c01c5691402e0d6c25489
-
Size
324KB
-
MD5
1c22fa80322fd53bae02ed3e7524fc0c
-
SHA1
466acd7212820c57379fd830f83d9419810d2ba0
-
SHA256
17231e7ba7d04967bda15e169008982936599103cd9c01c5691402e0d6c25489
-
SHA512
e4fe4b0f80a96d5ec474e7f12a6fb7ab5ae5fefc6b75fcbf5ba7c9fb4e3baeb40bfc0c8605a0d84f3cf961be47fff38ff026e608f0868d89fba0dc414f51b461
-
SSDEEP
6144:x303mYR98V8WvmSbW63MQJyCZc2fZvQ11/N7gTZAAypRVzspp627gQG:23mQ8zeSd3fYdOy/mWX7682bG
-
Detect Blackmoon payload
-
Gh0st RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-