General
-
Target
5f2112ea0825756f8725fb89bf4d9ac0b85e0522f27474e57bf8614b0fd7625d
-
Size
679KB
-
Sample
230323-fjg95sfe51
-
MD5
b779d6f00edcb313e8753ff3f5658e7d
-
SHA1
b42eac024cc568d6509f6da83908efc4a18b0c0f
-
SHA256
5f2112ea0825756f8725fb89bf4d9ac0b85e0522f27474e57bf8614b0fd7625d
-
SHA512
915c2b3afdc1d8eb6cc2c01051be24474ba38c88cd70c6e8dad0083ee655e4c61d348fa7aa9917317af9a5a5a563bf9c09527fa68d2a2ac1d2b71a71ffa02f97
-
SSDEEP
12288:vB4JyVDMXt4bWAZeGY0tBC9xokIHw9NYz2Bik:LVDMhGBL+rNYzEik
Static task
static1
Behavioral task
behavioral1
Sample
5f2112ea0825756f8725fb89bf4d9ac0b85e0522f27474e57bf8614b0fd7625d.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
5f2112ea0825756f8725fb89bf4d9ac0b85e0522f27474e57bf8614b0fd7625d
-
Size
679KB
-
MD5
b779d6f00edcb313e8753ff3f5658e7d
-
SHA1
b42eac024cc568d6509f6da83908efc4a18b0c0f
-
SHA256
5f2112ea0825756f8725fb89bf4d9ac0b85e0522f27474e57bf8614b0fd7625d
-
SHA512
915c2b3afdc1d8eb6cc2c01051be24474ba38c88cd70c6e8dad0083ee655e4c61d348fa7aa9917317af9a5a5a563bf9c09527fa68d2a2ac1d2b71a71ffa02f97
-
SSDEEP
12288:vB4JyVDMXt4bWAZeGY0tBC9xokIHw9NYz2Bik:LVDMhGBL+rNYzEik
-
Detect Blackmoon payload
-
Gh0st RAT payload
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-