General
-
Target
Zamok-2.3.4.msi
-
Size
3.1MB
-
Sample
230720-krax9aef4v
-
MD5
4230c415f63e80ab8fbad6a95226bd2a
-
SHA1
b37b2254f101139fd0f483b78352696de270e79e
-
SHA256
e2e3e2a10a0eaedc4ef695009026d90be4448efb58836ee72aa2f1a42254bd95
-
SHA512
685eb7cb00767acabf7ac93d70ab53bbb05b02b5da7da36e82d3f7641886898fcc095cbdb925598478a597752983cfa38d7f08a70a124f9a1d11fc0a648884cc
-
SSDEEP
98304:0ZkwGr9cLRnGssqypbpoLVwGSr4OC9rR8GmpfqL/5:0ZNGrlss9X8E461pfw
Static task
static1
Behavioral task
behavioral1
Sample
Zamok-2.3.4.msi
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Zamok-2.3.4.msi
Resource
win10v2004-20230703-en
Malware Config
Targets
-
-
Target
Zamok-2.3.4.msi
-
Size
3.1MB
-
MD5
4230c415f63e80ab8fbad6a95226bd2a
-
SHA1
b37b2254f101139fd0f483b78352696de270e79e
-
SHA256
e2e3e2a10a0eaedc4ef695009026d90be4448efb58836ee72aa2f1a42254bd95
-
SHA512
685eb7cb00767acabf7ac93d70ab53bbb05b02b5da7da36e82d3f7641886898fcc095cbdb925598478a597752983cfa38d7f08a70a124f9a1d11fc0a648884cc
-
SSDEEP
98304:0ZkwGr9cLRnGssqypbpoLVwGSr4OC9rR8GmpfqL/5:0ZNGrlss9X8E461pfw
Score7/10-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-