General
-
Target
f41127478f06c7ae7678e61ca05988789cbb78beb04d105cb5ddfc441d9aa630
-
Size
343KB
-
Sample
231121-l2x17sed6v
-
MD5
2ec3a66a0590ce7cfc2ef71e71635860
-
SHA1
062db91c2fcd8d0d7e44bf25e168bd0c0b0ff949
-
SHA256
f41127478f06c7ae7678e61ca05988789cbb78beb04d105cb5ddfc441d9aa630
-
SHA512
b0db83935fc32d4aac973225ee15f059c0c23d1cc2be8f32d6cb5689c216c8d0af64f7b62f7029dc3ec8dd16ff7639e826d5ff95277aa4302b03c1f5f61b8694
-
SSDEEP
6144:mCU/d3jO7xaRzfap6a3hTW1QZ6/uPKADFBWe0EbDP3dGbQXoh0W4CChNb:m95jOYRzyp6WhTWmPVDvb3D4hR4CChp
Behavioral task
behavioral1
Sample
f41127478f06c7ae7678e61ca05988789cbb78beb04d105cb5ddfc441d9aa630.exe
Resource
win7-20231023-en
Malware Config
Targets
-
-
Target
f41127478f06c7ae7678e61ca05988789cbb78beb04d105cb5ddfc441d9aa630
-
Size
343KB
-
MD5
2ec3a66a0590ce7cfc2ef71e71635860
-
SHA1
062db91c2fcd8d0d7e44bf25e168bd0c0b0ff949
-
SHA256
f41127478f06c7ae7678e61ca05988789cbb78beb04d105cb5ddfc441d9aa630
-
SHA512
b0db83935fc32d4aac973225ee15f059c0c23d1cc2be8f32d6cb5689c216c8d0af64f7b62f7029dc3ec8dd16ff7639e826d5ff95277aa4302b03c1f5f61b8694
-
SSDEEP
6144:mCU/d3jO7xaRzfap6a3hTW1QZ6/uPKADFBWe0EbDP3dGbQXoh0W4CChNb:m95jOYRzyp6WhTWmPVDvb3D4hR4CChp
-
Detect Blackmoon payload
-
Gh0st RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-