General
-
Target
ntokrnl.exe
-
Size
7.8MB
-
Sample
230702-x3ndyadc84
-
MD5
42f0acea7cd4c2a935f4ac3c0992b337
-
SHA1
2b481218208f8d8f25d8ed6ccffcedff76e6489b
-
SHA256
1ba6c7403902ed98b7f9b0729720633a0993c7d3a80774a7f9e6b7ad43c6d470
-
SHA512
c9d54b9676f6ba2ba6def8e89e633322bbc8807c59717014dcf9f84ec526be901e188681066685b4875f7cf22d5f21a03c7edd012186163f6f4b77947ea75430
-
SSDEEP
196608:ZrMldQmRJ8dA6loVCy1ArqkVpKCX+PrF4ZIeghQsTF2MJh:FcdQusloVrAZYCuPJOIeg5QW
Behavioral task
behavioral1
Sample
ntokrnl.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
ntokrnl.exe
Resource
win10v2004-20230621-en
Malware Config
Targets
-
-
Target
ntokrnl.exe
-
Size
7.8MB
-
MD5
42f0acea7cd4c2a935f4ac3c0992b337
-
SHA1
2b481218208f8d8f25d8ed6ccffcedff76e6489b
-
SHA256
1ba6c7403902ed98b7f9b0729720633a0993c7d3a80774a7f9e6b7ad43c6d470
-
SHA512
c9d54b9676f6ba2ba6def8e89e633322bbc8807c59717014dcf9f84ec526be901e188681066685b4875f7cf22d5f21a03c7edd012186163f6f4b77947ea75430
-
SSDEEP
196608:ZrMldQmRJ8dA6loVCy1ArqkVpKCX+PrF4ZIeghQsTF2MJh:FcdQusloVrAZYCuPJOIeg5QW
Score8/10-
Downloads MZ/PE file
-
Modifies Installed Components in the registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-