General
-
Target
roamingkiller.zip
-
Size
1.9MB
-
Sample
240125-ts986sbdbp
-
MD5
2467f31cdec445df68ec6244726cb273
-
SHA1
cbdff6c3430b4d2ddd1d3fb16ea94ff09b98913b
-
SHA256
1efbfb8f9e441370bb3f3a316fea237564eefebbf4ba33cccdae5f853c86a7b0
-
SHA512
eb79c5f003944503477e297f8f2ae1f13bfbce58ed144d47df21c01639e20f6a8cfaa6ea1215a7b993090f86a9b94af85ab4d2f8b618c4c5a9c93f72e75d7c06
-
SSDEEP
49152:U4tfFfcyNtMmDjedW6ECW5sDnLVKtLn+j:UgFf3Jf6ENqnxcW
Static task
static1
Behavioral task
behavioral1
Sample
roamingkiller.msi
Resource
win7-20231215-en
Malware Config
Targets
-
-
Target
roamingkiller.msi
-
Size
4.0MB
-
MD5
986f09656e4864f9731312b0343df116
-
SHA1
c83264f9d18f45359a3c31822a35eeea24218e0e
-
SHA256
8738866be2f39ac05df243bbe2c82dfc6c125643cc5c75e5f199701fbacc90c9
-
SHA512
61c92dee7d1d26738f4fb447d5272b85f7b82aa7e15ace3bedc815d0542477435c7b33a517362fa70db70d09d4d55cb538413f7c22820dd8db46cbd80d271b73
-
SSDEEP
49152:apUPV9qhCxzT+WKjSX1dzLVI4QNhhg7HAS35gqffIn2VvsOUxNUP/YN6bhvqIis:apECQ15Le07H1WqHF9jUvUP/YE1v
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-