General
-
Target
f1373405a08615f3c93b33e81cbe36a1b6fff3999bffb7860f0298cd056ddc20
-
Size
1.0MB
-
Sample
230523-c94paaed4y
-
MD5
4fbedfd99b1cb6e277f30dd417f7cf7c
-
SHA1
6bdb8457a3a398ca60c1e7ddd7b0744bb1678a5a
-
SHA256
f1373405a08615f3c93b33e81cbe36a1b6fff3999bffb7860f0298cd056ddc20
-
SHA512
efd9f1e0f537da25beaa4404f769f8c25668f4746d9323b348bfc30fbaeab02ebcb045f48604e1b66f5a13ab880d4374d33ba655e823603ea8ee83df722d7ff7
-
SSDEEP
12288:v/FOT61RTcnMbA/+Lkv+I7lVvWdtFuUqZLRm:n4AS2A/+LS+wM
Behavioral task
behavioral1
Sample
f1373405a08615f3c93b33e81cbe36a1b6fff3999bffb7860f0298cd056ddc20.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
f1373405a08615f3c93b33e81cbe36a1b6fff3999bffb7860f0298cd056ddc20
-
Size
1.0MB
-
MD5
4fbedfd99b1cb6e277f30dd417f7cf7c
-
SHA1
6bdb8457a3a398ca60c1e7ddd7b0744bb1678a5a
-
SHA256
f1373405a08615f3c93b33e81cbe36a1b6fff3999bffb7860f0298cd056ddc20
-
SHA512
efd9f1e0f537da25beaa4404f769f8c25668f4746d9323b348bfc30fbaeab02ebcb045f48604e1b66f5a13ab880d4374d33ba655e823603ea8ee83df722d7ff7
-
SSDEEP
12288:v/FOT61RTcnMbA/+Lkv+I7lVvWdtFuUqZLRm:n4AS2A/+LS+wM
-
Detect Blackmoon payload
-
Gh0st RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-