General
-
Target
27163309.exe
-
Size
210KB
-
Sample
230331-f5m3hsgf45
-
MD5
3c2241f0c7d29032d0130a2ddbc9c2fa
-
SHA1
0fdc6879b4e8d617827b7568ffacfec750945fbd
-
SHA256
82ae5e783b35a1bdc9574991132dea83e4d46b20f14f61ca764fc1057959f857
-
SHA512
21e27c63e393aab29637ba2b6f6a00b4e9f71331acbdc4efa793e7e7d806b5a401478aa0964234ef5dde13f4b2434abb1090b368792aedb9120dc3e0fc9ed6ac
-
SSDEEP
6144:JwROTC3S05EouCW/deSXPyWSp8i7i9xJGQqHu/:TTztCWFecimsiPv/
Behavioral task
behavioral1
Sample
27163309.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
27163309.exe
-
Size
210KB
-
MD5
3c2241f0c7d29032d0130a2ddbc9c2fa
-
SHA1
0fdc6879b4e8d617827b7568ffacfec750945fbd
-
SHA256
82ae5e783b35a1bdc9574991132dea83e4d46b20f14f61ca764fc1057959f857
-
SHA512
21e27c63e393aab29637ba2b6f6a00b4e9f71331acbdc4efa793e7e7d806b5a401478aa0964234ef5dde13f4b2434abb1090b368792aedb9120dc3e0fc9ed6ac
-
SSDEEP
6144:JwROTC3S05EouCW/deSXPyWSp8i7i9xJGQqHu/:TTztCWFecimsiPv/
-
Detect Blackmoon payload
-
Gh0st RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-