General
-
Target
0f79da23dc318670dcd4f8709d04826420b50bbdb080a2fff7573e11a875b22d
-
Size
927KB
-
Sample
230812-kwt7pada31
-
MD5
84176f70ad3712b0ad2aa449ba8c6341
-
SHA1
783cb3d63e6e1933db92853f148df8828a11e5a3
-
SHA256
0f79da23dc318670dcd4f8709d04826420b50bbdb080a2fff7573e11a875b22d
-
SHA512
dc8361f6c9ce7a3f23997137c54f75c906fc517bd34134e813ea1d5ec9191c16a1f2c8d233701b0d126927dfe669957723b63bf579b20e64b110ee425240cea4
-
SSDEEP
24576:zdcfbRjPxvNP63JaGIPszNvGfhdZ7psbX7TPYD9lDC:+P63JIPs4fFWbrMD9lO
Static task
static1
Behavioral task
behavioral1
Sample
0f79da23dc318670dcd4f8709d04826420b50bbdb080a2fff7573e11a875b22d.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
0f79da23dc318670dcd4f8709d04826420b50bbdb080a2fff7573e11a875b22d.exe
Resource
win10v2004-20230703-en
Malware Config
Targets
-
-
Target
0f79da23dc318670dcd4f8709d04826420b50bbdb080a2fff7573e11a875b22d
-
Size
927KB
-
MD5
84176f70ad3712b0ad2aa449ba8c6341
-
SHA1
783cb3d63e6e1933db92853f148df8828a11e5a3
-
SHA256
0f79da23dc318670dcd4f8709d04826420b50bbdb080a2fff7573e11a875b22d
-
SHA512
dc8361f6c9ce7a3f23997137c54f75c906fc517bd34134e813ea1d5ec9191c16a1f2c8d233701b0d126927dfe669957723b63bf579b20e64b110ee425240cea4
-
SSDEEP
24576:zdcfbRjPxvNP63JaGIPszNvGfhdZ7psbX7TPYD9lDC:+P63JIPs4fFWbrMD9lO
-
AmmyyAdmin payload
-
FlawedAmmyy RAT
Remote-access trojan based on leaked code for the Ammyy remote admin software.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-