General
-
Target
7ff002e35c7433be31f9ec5ca0b6d64ba6b8d92072893a3d708e7e94879af8a8
-
Size
159KB
-
Sample
230505-ygl5escd5s
-
MD5
9817350719ad28a06cc16e638f4780f4
-
SHA1
96a0a69291180ab55b20e6aafc09af8d6810c283
-
SHA256
7ff002e35c7433be31f9ec5ca0b6d64ba6b8d92072893a3d708e7e94879af8a8
-
SHA512
800db2672382b8f6f4f384e2b4a59a09b61ec7e87f1cb37adf51e0203e61e21c23c35fbb71541a59e42fe247ea083ab871bb85252ccfffee48232e8ccb46bd51
-
SSDEEP
3072:SV8s89ENEbWT7NApW1aru+41GKe3ZvhYQ9SJ9BQt7QV2BS9t1ca/QclT7:SZbWWT7NAkJrpe3ZKWBt7QV2It1fl3
Static task
static1
Behavioral task
behavioral1
Sample
7ff002e35c7433be31f9ec5ca0b6d64ba6b8d92072893a3d708e7e94879af8a8.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
7ff002e35c7433be31f9ec5ca0b6d64ba6b8d92072893a3d708e7e94879af8a8
-
Size
159KB
-
MD5
9817350719ad28a06cc16e638f4780f4
-
SHA1
96a0a69291180ab55b20e6aafc09af8d6810c283
-
SHA256
7ff002e35c7433be31f9ec5ca0b6d64ba6b8d92072893a3d708e7e94879af8a8
-
SHA512
800db2672382b8f6f4f384e2b4a59a09b61ec7e87f1cb37adf51e0203e61e21c23c35fbb71541a59e42fe247ea083ab871bb85252ccfffee48232e8ccb46bd51
-
SSDEEP
3072:SV8s89ENEbWT7NApW1aru+41GKe3ZvhYQ9SJ9BQt7QV2BS9t1ca/QclT7:SZbWWT7NAkJrpe3ZKWBt7QV2It1fl3
-
Detect Blackmoon payload
-
Gh0st RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-