General
-
Target
PROD_Start_DriverPack.hta
-
Size
1KB
-
Sample
231023-fdm87sea6v
-
MD5
dda846a4704efc2a03e1f8392e6f1ffc
-
SHA1
387171a06eee5a76aaedc3664385bb89703cf6df
-
SHA256
e9dc9648d8fb7d943431459f49a7d9926197c2d60b3c2b6a58294fd75b672b25
-
SHA512
5cc5ad3fbdf083a87a65be76869bca844faa2d9be25657b45ad070531892f20d9337739590dd8995bca03ce23e9cb611129fe2f8457879b6263825d6df49da7a
Static task
static1
Behavioral task
behavioral1
Sample
PROD_Start_DriverPack.hta
Resource
win7-20230831-es
Behavioral task
behavioral2
Sample
PROD_Start_DriverPack.hta
Resource
win10v2004-20231020-es
Malware Config
Extracted
http://dwrapper-prod.herokuapp.com/bin/watcher.html
Targets
-
-
Target
PROD_Start_DriverPack.hta
-
Size
1KB
-
MD5
dda846a4704efc2a03e1f8392e6f1ffc
-
SHA1
387171a06eee5a76aaedc3664385bb89703cf6df
-
SHA256
e9dc9648d8fb7d943431459f49a7d9926197c2d60b3c2b6a58294fd75b672b25
-
SHA512
5cc5ad3fbdf083a87a65be76869bca844faa2d9be25657b45ad070531892f20d9337739590dd8995bca03ce23e9cb611129fe2f8457879b6263825d6df49da7a
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Executes dropped EXE
-
Loads dropped DLL
-