General
-
Target
fdd100611f6b894cc124c11840fa506cf595dcd7681855d1d0c08c33b97e49a3
-
Size
2.2MB
-
Sample
230825-ev1p7aha24
-
MD5
8de0a87c37e650834e7f38c738c52f46
-
SHA1
83d99e21723ef7c5786682f5c44f332615dbeff9
-
SHA256
fdd100611f6b894cc124c11840fa506cf595dcd7681855d1d0c08c33b97e49a3
-
SHA512
ed5c6a41ac6ca998c4935827933fd9eb29d6fcb064c2739ee64896d4029dbb634f2a37eef4356b1fc9b50f6aa2553570cc1a6f38fbcee3ff42124986cfb4f341
-
SSDEEP
49152:W05xqEi4wELh/LSKcxGciUgbtNH29QxqJmfJP7bL/PxVoT:W05AnELZ2KcxpiLtNW9RkfJPnL/PxE
Behavioral task
behavioral1
Sample
控制端.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
控制端.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
被控端.exe
Resource
win7-20230824-en
Behavioral task
behavioral4
Sample
被控端.exe
Resource
win10v2004-20230703-en
Malware Config
Targets
-
-
Target
控制端.exe
-
Size
903KB
-
MD5
da51464938eea4e5f7eaf7b71cd8782f
-
SHA1
2b8077e916f68cc21a4959d86b9fd1e44c59fe67
-
SHA256
26a8ada86662f2ca2f0e7466e52126ced6bea1278a1a5c5f6f602540c5574acf
-
SHA512
a99c03b9131ef7847ee4e8e9e163d4cdb75147ae78bc0665d57fc429a1987dffcf22e0686af16441cf2c7ea399b2517e426a31ee2203888870207414cbeeecfa
-
SSDEEP
24576:M2EasQY8onQFyQwL0C0fDvwqZg3kG12BK2hWETnzr:poWSf0f0qu3R12g2hFz
Score7/10 -
-
-
Target
被控端.exe
-
Size
1.3MB
-
MD5
a81c0bc1b3dcd4a5386f81c3f013afc0
-
SHA1
a2e0553d84f25859d3509d64ed58809a68104052
-
SHA256
9fa13f87b3b7154c68c36fc9ec5cd3dec4c5ee2a7d78f06edd93539b1ac27aed
-
SHA512
723de3db4cbaa416c7feea215f44064a2ce2f6e0d87e738afa5847a1ee172736328efd11e6d1e4b9ab33dc89c350f279142f0eb758ae260ee872390b65826f5f
-
SSDEEP
24576:OXpQs62u6fGL0Jr8Ub09JskxRyEgSI84VxOFRbfDmorQf5lOBzLaTATPLo824WgB:OZz6ofGm8UA9JskxRyjSI84VxuRbfLrm
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-