General
-
Target
tmp
-
Size
301KB
-
Sample
240125-v4h5habgb8
-
MD5
d7e07baf23641fa08a4067ca07ea4b4d
-
SHA1
eda4e790cde8b30cb46558b94415e4a916f56e78
-
SHA256
c7cbef34bbc2ae01c9131646954a2fec8ab6f7cbd70ee2d92eada6796884e1b8
-
SHA512
ffc65c88345d482bbfe100f8ca804b4470dedab81c580873e5134872d41aa74c9bb11c3978165b0f62e275b2c95f2c158f02222d02e64f7e794bc157699f89a5
-
SSDEEP
6144:HhjGvEehzo1urn+utlHJ3hfcAOqGJF/p/uwONct43j92UysA:H12Eehzo1uDkf9pGHNu4B2UW
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231215-en
Malware Config
Targets
-
-
Target
tmp
-
Size
301KB
-
MD5
d7e07baf23641fa08a4067ca07ea4b4d
-
SHA1
eda4e790cde8b30cb46558b94415e4a916f56e78
-
SHA256
c7cbef34bbc2ae01c9131646954a2fec8ab6f7cbd70ee2d92eada6796884e1b8
-
SHA512
ffc65c88345d482bbfe100f8ca804b4470dedab81c580873e5134872d41aa74c9bb11c3978165b0f62e275b2c95f2c158f02222d02e64f7e794bc157699f89a5
-
SSDEEP
6144:HhjGvEehzo1urn+utlHJ3hfcAOqGJF/p/uwONct43j92UysA:H12Eehzo1uDkf9pGHNu4B2UW
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-