General
-
Target
GrayWolf by SuPijote BoomBang.rar
-
Size
1.8MB
-
Sample
240102-kjs4vseahj
-
MD5
d73c4c3dae7c6e0ca3ae46d5a216e4ef
-
SHA1
345fa0d7df7ad661e96c46972c65e3240bc7580a
-
SHA256
4a56bdee61fd88c0452cd7d2c4519585fe516fea390d8f671be75ae0ac9e7aef
-
SHA512
cd1d1077e26176c356c61e81f4c238a0fa67b0dab63968925aa632c5b19cc86c5698cdeb08829c105fbfbe9bf95544cc3821246d1addf38eff5c41bfc5de07b4
-
SSDEEP
49152:b3iwVAf68epZcvJleyk7iYHuq1lDUkUvN:bpVAfipZcvJleyk7juq/UzN
Behavioral task
behavioral1
Sample
GrayWolf.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
GrayWolf.exe
-
Size
5.4MB
-
MD5
02a88d03242515576fa54218538e34fa
-
SHA1
ed6f90fcbf9fabf0da167987e1c2647833df5d6e
-
SHA256
533afe3493caae3a36d03f7766aeeec4de9f682a76d73b8098f975daacf48c0b
-
SHA512
b9b0a03500e5ef66569dc42b07c5da6c186660989403bafd9f8511303add0622f8a9f670f73dffa3ddd8fe044b82c4e26a4ad6ae6e1aa0898c72b3ef671e09d5
-
SSDEEP
49152:jF/5OwXqsw+mw6j4w6SAZplWz3SUcSUWrXxRyJQfSqF6kr3Az0:j/B0rQgCUcSUWOv98J
Score7/10-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-