General
-
Target
78820d3214565b9958d30b12809d7f4640b901f2fd6cfa270230bcef8ae65031
-
Size
318KB
-
Sample
230314-ewxpxsfd4t
-
MD5
5ce44008c4372001cb7678bc7dc8f00c
-
SHA1
ba946a7a4be8f025bce238468ce3d2cd72ca313d
-
SHA256
78820d3214565b9958d30b12809d7f4640b901f2fd6cfa270230bcef8ae65031
-
SHA512
9b0ea574bb837a7ca2419a482e3631d3036f3172ac36ccde18be37039a7286e1fc69439bc75c400ba72ad4b549898cd28efd9516d00a0b8bb404b88888e723ba
-
SSDEEP
6144:ly6a+OEqfTG1Rljw5zudnuIyOQ5UDz9uLXtUSRGyQ/LLH/iDN7pLKM:Y+OD06AdnVyZUnULXtUSR78vWN7j
Static task
static1
Behavioral task
behavioral1
Sample
78820d3214565b9958d30b12809d7f4640b901f2fd6cfa270230bcef8ae65031.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
78820d3214565b9958d30b12809d7f4640b901f2fd6cfa270230bcef8ae65031
-
Size
318KB
-
MD5
5ce44008c4372001cb7678bc7dc8f00c
-
SHA1
ba946a7a4be8f025bce238468ce3d2cd72ca313d
-
SHA256
78820d3214565b9958d30b12809d7f4640b901f2fd6cfa270230bcef8ae65031
-
SHA512
9b0ea574bb837a7ca2419a482e3631d3036f3172ac36ccde18be37039a7286e1fc69439bc75c400ba72ad4b549898cd28efd9516d00a0b8bb404b88888e723ba
-
SSDEEP
6144:ly6a+OEqfTG1Rljw5zudnuIyOQ5UDz9uLXtUSRGyQ/LLH/iDN7pLKM:Y+OD06AdnVyZUnULXtUSR78vWN7j
-
Detect Blackmoon payload
-
Gh0st RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-