General
-
Target
f1948b20c6391592ba65b9dfbe9c90b2e81923e1c327c5c1b851f3a2c13ad58f
-
Size
220KB
-
Sample
230412-ysz6eseg28
-
MD5
5e4f863b9f834f972821c780ead30bd3
-
SHA1
9877329e8c5b33160fb5bb3428a4446c8936aed0
-
SHA256
f1948b20c6391592ba65b9dfbe9c90b2e81923e1c327c5c1b851f3a2c13ad58f
-
SHA512
7d3e90bcf6be982efd135fc6f4f25ea0679084465d98aa45b6befd70e9cc92777f126205a7f2ca66ac3ddd14937fb840d6c88ba0a187f7472f081a0d19d76f9e
-
SSDEEP
3072:sqtk2tL7E8TGNSOZtvbEwctSC8JSu+B/+RtXTOMQt9ccOy:sqtks4Vp1h9+B/0jOLDJOy
Behavioral task
behavioral1
Sample
f1948b20c6391592ba65b9dfbe9c90b2e81923e1c327c5c1b851f3a2c13ad58f.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
f1948b20c6391592ba65b9dfbe9c90b2e81923e1c327c5c1b851f3a2c13ad58f
-
Size
220KB
-
MD5
5e4f863b9f834f972821c780ead30bd3
-
SHA1
9877329e8c5b33160fb5bb3428a4446c8936aed0
-
SHA256
f1948b20c6391592ba65b9dfbe9c90b2e81923e1c327c5c1b851f3a2c13ad58f
-
SHA512
7d3e90bcf6be982efd135fc6f4f25ea0679084465d98aa45b6befd70e9cc92777f126205a7f2ca66ac3ddd14937fb840d6c88ba0a187f7472f081a0d19d76f9e
-
SSDEEP
3072:sqtk2tL7E8TGNSOZtvbEwctSC8JSu+B/+RtXTOMQt9ccOy:sqtks4Vp1h9+B/0jOLDJOy
-
Detect Blackmoon payload
-
Gh0st RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-