General
-
Target
a9a03510b446a53a00552d7a8e7fbae1c3951a7e4607b781f984ceae087e34f9
-
Size
860KB
-
Sample
230411-ydx3hsgd9s
-
MD5
e2d8f93e9c519f5994c87f5f3ca5ed47
-
SHA1
550f8562c930ab43f28985e77291fc0ef21cc79c
-
SHA256
a9a03510b446a53a00552d7a8e7fbae1c3951a7e4607b781f984ceae087e34f9
-
SHA512
e3086b8308f87917c33d6b2a236a0a151b8be5439bbc99e7b0517d852ea3a160de85697c6498fbf0177abf8758bef1d48a4354289487e9a7118b6ced11ca4885
-
SSDEEP
12288:D+aqnjQNWk8zzJtTJJrzZodlnuB4GWu0zEXrpwB1jPo4OA:DCnjEWkszvTJJr9od7E7pwPo4OA
Static task
static1
Behavioral task
behavioral1
Sample
a9a03510b446a53a00552d7a8e7fbae1c3951a7e4607b781f984ceae087e34f9.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
a9a03510b446a53a00552d7a8e7fbae1c3951a7e4607b781f984ceae087e34f9
-
Size
860KB
-
MD5
e2d8f93e9c519f5994c87f5f3ca5ed47
-
SHA1
550f8562c930ab43f28985e77291fc0ef21cc79c
-
SHA256
a9a03510b446a53a00552d7a8e7fbae1c3951a7e4607b781f984ceae087e34f9
-
SHA512
e3086b8308f87917c33d6b2a236a0a151b8be5439bbc99e7b0517d852ea3a160de85697c6498fbf0177abf8758bef1d48a4354289487e9a7118b6ced11ca4885
-
SSDEEP
12288:D+aqnjQNWk8zzJtTJJrzZodlnuB4GWu0zEXrpwB1jPo4OA:DCnjEWkszvTJJr9od7E7pwPo4OA
-
Detect Blackmoon payload
-
Gh0st RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-