General
-
Target
conf.zip
-
Size
2KB
-
Sample
230827-2em6gsdf23
-
MD5
f94f90824462091dc2123277582a380d
-
SHA1
ef1d09b7e83782a547facf36fccf848482475fa3
-
SHA256
884ef747b4d2d5475674db0544a8bd4f3dde6f4f5ae4c7523331ebcbd31d6f27
-
SHA512
941dafb0184359b36a83405eb51a1c44ed4bffa60145b1302fbd078f6a56e84084a0f5fd553cf72b7fe5c0abfaadd8ea9fb45c3f8d40bf9505849d6c8a9d783a
Static task
static1
Behavioral task
behavioral1
Sample
data_conf.lnk
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
data_conf.lnk
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
dependentlibs.list
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
dependentlibs.list
Resource
win10v2004-20230703-en
Malware Config
Targets
-
-
Target
data_conf.lnk
-
Size
1KB
-
MD5
598ea8c6f5035c7f096419da69d7a92e
-
SHA1
1e0c9b378f5f8f80bbd67c6c46acb8a174913768
-
SHA256
fee9c51d03cebc85b04228cb3238fe994436435f20e3628b978fd2ac8d85e03e
-
SHA512
00d868a21f9db1a280c2c8cc3188702bc604cf459ce5218e6be2419b48e48b288e42de3a1ec20bf4895e93fa6cc8d66f6723bee3743cc2977b2a3fdc808d1179
-
Babadeda Crypter
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Use of msiexec (install) with remote resource
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
dependentlibs.list
-
Size
1024B
-
MD5
1e4e1ba1c75a7d251e1418f634ff7dee
-
SHA1
7eea9ccfc87de20181f5a38631d2bce4785f9ff9
-
SHA256
13a15c4cc399b5af5a4ec1dd2239ed1b5c7cd21283edfa6aeed33240ea977d69
-
SHA512
08043945d1490f314ae2b9031fc35ed0f55094cd8c12af8bcc040872200a67266fd534fd768aa8cef9576fe6138b37f4181bd2405a57b54fb23d5281e59fee55
Score3/10 -