General
-
Target
bloknot.exe
-
Size
242KB
-
Sample
231014-phbweadh3v
-
MD5
2db6b8c908e6e44bda6c6aef6179e5bf
-
SHA1
c5f14cd93399049e2ae81cbca7baf63e7b83d56f
-
SHA256
33da988c25f79c4a00f1d5facacb53ee1d24a9dc087034caafdcc79eda462689
-
SHA512
8d0baee4906c172dcb42fe801d743e205441865c4a113f6273d2de29c1a68660782d50cf6929e94b8f069cb31613eec8a5e36a691509860ca9fbb09cb5a0b168
-
SSDEEP
3072:QagdEByMuZJ/+oNbynzrVCd/e39IjqwBSArDrvD3buZcbjskkkdjg0uiy:QUByrr+oyzro4UDrvXulkkkdjgziy
Static task
static1
Behavioral task
behavioral1
Sample
bloknot.exe
Resource
win10-20230915-en
Malware Config
Targets
-
-
Target
bloknot.exe
-
Size
242KB
-
MD5
2db6b8c908e6e44bda6c6aef6179e5bf
-
SHA1
c5f14cd93399049e2ae81cbca7baf63e7b83d56f
-
SHA256
33da988c25f79c4a00f1d5facacb53ee1d24a9dc087034caafdcc79eda462689
-
SHA512
8d0baee4906c172dcb42fe801d743e205441865c4a113f6273d2de29c1a68660782d50cf6929e94b8f069cb31613eec8a5e36a691509860ca9fbb09cb5a0b168
-
SSDEEP
3072:QagdEByMuZJ/+oNbynzrVCd/e39IjqwBSArDrvD3buZcbjskkkdjg0uiy:QUByrr+oyzro4UDrvXulkkkdjgziy
Score8/10-
Modifies Installed Components in the registry
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-