General
-
Target
host.zip
-
Size
208KB
-
Sample
230413-xjg3tade34
-
MD5
53ce3a5d1987f019f63a0679a2f25bce
-
SHA1
1db064653e30ca5e82d122bdc4782dac9e941fbb
-
SHA256
6d95cc3e22440072584093590b2f419891cfbf817c8bf92bb382af39c9abb0b3
-
SHA512
b068af426806471a85e755fe46afe311935917be2e4a43c8410ef468a5fd1fdbb698877fbd63aededb0d616cbaa992a0a63eda265df081fe4f0edf4c77904ee7
-
SSDEEP
6144:jW1Qq2GiU6Uc3EAQon8H+zVx/WnqFTC88u+jh:j9RPU6UwX8H2/bOPu+
Behavioral task
behavioral1
Sample
host.exe
Resource
win10-20230220-en
Malware Config
Extracted
C:\Users\Admin\Documents\BB_Readme_TN9C6FQY.txt
http://a2dbso6dijaqsmut36r6y4nps4cwivmfog5bpzf6uojovce6f3gl36id.onion:81/04627c46c06cdb26c7194498a6c7e4b07aeae2c0d31657c56d681eb133bfa4e4
http://jbeg2dct2zhku6c2vwnpxtm2psnjo2xnqvvpoiiwr5hxnc6wrp3uhnad.onion/
Targets
-
-
Target
host.exe
-
Size
215KB
-
MD5
a487c7f8523ac40b5a633d5d885e8d47
-
SHA1
990a762a0a80da13e716653d9ee1b7f5dc1a0172
-
SHA256
796531b6bc24d389750d5db0dc3596456b7f050d3bac280f31563ae362e9f120
-
SHA512
a289b31edcd2850041da6623766d923c30917ea56026b40a288f11a345c25dd00a24e3b5712a59077beea88c9cbc72da5ef9ac61aae6a8e3818e6d1c6819083d
-
SSDEEP
6144:JqQo2GcU6qc3EAQsnqHSz5x5WnqFPC88uu6o:1nfU6qw/qH85baPuu
Score10/10-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-