General
-
Target
file
-
Size
50KB
-
Sample
230609-nl53zsca49
-
MD5
9d846bb9fbd2e4ce0a2344b02d535e9c
-
SHA1
91bb1d20302d740b733d155bd42556038b900380
-
SHA256
ad6dd2baa672f859b2da3916317449966604627dbf0991f2872db0f7c8b9ae07
-
SHA512
bd07b8443719dafadad2106dceeb5eec060b0606f3b9344495506ddcb40eebbac0b115430efe6b45a87579b120512b4a07e8d1903c11f8291d1712fe35fc1596
-
SSDEEP
768:7eX7e/XWwa+6NMLh2J84nhRDsMx1zO1fu8iSUKWay0CE5qb4rafuPg:iS/XWwP6NkohRoE1zOFoKWarefuPg
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
file
-
Size
50KB
-
MD5
9d846bb9fbd2e4ce0a2344b02d535e9c
-
SHA1
91bb1d20302d740b733d155bd42556038b900380
-
SHA256
ad6dd2baa672f859b2da3916317449966604627dbf0991f2872db0f7c8b9ae07
-
SHA512
bd07b8443719dafadad2106dceeb5eec060b0606f3b9344495506ddcb40eebbac0b115430efe6b45a87579b120512b4a07e8d1903c11f8291d1712fe35fc1596
-
SSDEEP
768:7eX7e/XWwa+6NMLh2J84nhRDsMx1zO1fu8iSUKWay0CE5qb4rafuPg:iS/XWwP6NkohRoE1zOFoKWarefuPg
Score10/10-
Detects LgoogLoader payload
-
LgoogLoader
A downloader capable of dropping and executing other malware families.
-
Sets service image path in registry
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-