General
-
Target
Badlion Client Setup 3.16.0.exe
-
Size
129.3MB
-
Sample
230628-c3wp4agb39
-
MD5
7c3a7f421537d2320e71cd80320dda25
-
SHA1
d538c158632582338e9e341685890adcf97e7cff
-
SHA256
938f0f59b235568981600a40bf7d6b0f7d01199405729fcd1fd26c0f52c9d3c4
-
SHA512
f77b16d938d34a975a7081271159e436b1c67a25a7246cb0f10d072e8b009b0f9bf7b777cb77d650ee6e171366449200ff3d56ad6074338e21534c6d91842201
-
SSDEEP
3145728:yYj7E+aREYwAT2roh0SgtY0NtZns6FUEF:Pj7QrTwoWSetZnsWUE
Static task
static1
Behavioral task
behavioral1
Sample
Badlion Client Setup 3.16.0.exe
Resource
win10v2004-20230621-en
Malware Config
Targets
-
-
Target
Badlion Client Setup 3.16.0.exe
-
Size
129.3MB
-
MD5
7c3a7f421537d2320e71cd80320dda25
-
SHA1
d538c158632582338e9e341685890adcf97e7cff
-
SHA256
938f0f59b235568981600a40bf7d6b0f7d01199405729fcd1fd26c0f52c9d3c4
-
SHA512
f77b16d938d34a975a7081271159e436b1c67a25a7246cb0f10d072e8b009b0f9bf7b777cb77d650ee6e171366449200ff3d56ad6074338e21534c6d91842201
-
SSDEEP
3145728:yYj7E+aREYwAT2roh0SgtY0NtZns6FUEF:Pj7QrTwoWSetZnsWUE
Score8/10-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-