General
-
Target
Nitro_Generator.rar
-
Size
2.2MB
-
Sample
230727-a53v3shd3w
-
MD5
5104afca697acdbbe257368d12a6d740
-
SHA1
f85669fa269c97ef7e1cf7ad738ca9108de970ab
-
SHA256
ec9ca9135a1052109a310cbf594ce26b2d52545c6f254d7d042ec61f09dfea90
-
SHA512
d5f54d16185d4cd100940abbf72795b08b5c41599f130cfd24a865672b8521acfa4242c70a709ec5770b24b9ae85eed24bb1f153bba374fa0cfbbf0f938cd351
-
SSDEEP
49152:Ta+uXZLXjFQQzRZaI7rYyPmIdPYd0McyZmSrNIObsMNWzJCJ1:di1jFQ+R0YrDmoYyVyZrrNnWzJ01
Static task
static1
Behavioral task
behavioral1
Sample
README.txt
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
README.txt
Resource
win10v2004-20230703-en
Malware Config
Targets
-
-
Target
README.txt
-
Size
165B
-
MD5
8442be2b02b3f221a2d921c51aaed9c8
-
SHA1
96dde1b75404f8efcfcdf999648084557c72d98f
-
SHA256
06aa5daed7559bf36d3b0658ffe46bfa6c8b64a2782c9dc12e913be3ab225fd7
-
SHA512
5ecef7a5e86454e1dd2c37e5907b8019b523232de317413176815ce8e82936e47eff16e1a8b62311c4affe159689c214a4d0ef3c682d49291b25f11fae02e496
Score7/10-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-