General
-
Target
0e273aefb605c7e0fd42437a83a55321152b28c01bfe4f915f0c0d44a1971526
-
Size
5.5MB
-
Sample
240118-yd3m1agaeq
-
MD5
bca40b54c67d7fb050035d39038c8191
-
SHA1
29d55daa1dd1a2786e1102b78626002203f760d2
-
SHA256
0e273aefb605c7e0fd42437a83a55321152b28c01bfe4f915f0c0d44a1971526
-
SHA512
bfe48aaed4516275daaa980f7106d832afd63b78a91f17e6900d938dbaa2b37790e397ac3649450ef6432657a9d3feb5509f8583285f10ce0b33071b7a72c910
-
SSDEEP
98304:sv44jVR+XKgpmd9yW2AU81WNe27yqcWQkquCamRL4rDrgnELUEYd0S9agnhNI0A/:SVQnmdyAB1WPjUuCae4rDgd88NWRS0l
Static task
static1
Behavioral task
behavioral1
Sample
JJSploit_7.3.0_x86_en-US.msi
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
JJSploit_7.3.0_x86_en-US.msi
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
JJSploit_7.3.0_x86_en-US.msi
-
Size
5.8MB
-
MD5
9c232fe2ede51929244afc5c67e53b51
-
SHA1
8e8bb0eda09d25c1f44b8abd66a7e15a414b76f5
-
SHA256
1985fdbec700334fbb2c907f37a102930744e6b3e9198c25f516eae9f6854e9b
-
SHA512
d7ba56ed15a4bb482a69543e6bfe11d0aed4bf6b6b037d51dc2d191e1eaae187d1297bbb7c847d73259c34bb9ee26f26f3689c2592b4ff92968101303be61492
-
SSDEEP
98304:57AC5TdoYMyLSRpyviWkKPm7I2lLYaQ9OoSwYQf9Ib9XuvmhueA34SHeFblFY6nm:/T+USRLWtPm/O9SwYmIb9S5K3F6Wa
Score6/10-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-