General
-
Target
7538dd6e69d0c65d2dc0eb091c3ced18
-
Size
3.8MB
-
Sample
240125-w9lm9adgdp
-
MD5
7538dd6e69d0c65d2dc0eb091c3ced18
-
SHA1
9d91e4cc3c59c258ae2655119692c13c899d68d2
-
SHA256
142a30f9ba3c2e1efbdf15241721da3b20d7b6436761d3eaafdcc095dc681fc4
-
SHA512
935aed41fbc1bb42cdc4b2c10fd306286642428c017248a71297d7674439415a410464a75b0529eec4b7a98f052408afcde24a501f6970fa405d642aafadb6c6
-
SSDEEP
98304:D77Pmq33rE/JDLPWZADUGer7B6iY74M/mmlwXVZaFB:L+R/eZADUXR
Behavioral task
behavioral1
Sample
7538dd6e69d0c65d2dc0eb091c3ced18.msi
Resource
win7-20231215-en
Malware Config
Extracted
bitrat
1.38
79.134.225.73:19099
-
communication_password
411f9a6dd54344976e951469585a6963
-
tor_process
tor
Targets
-
-
Target
7538dd6e69d0c65d2dc0eb091c3ced18
-
Size
3.8MB
-
MD5
7538dd6e69d0c65d2dc0eb091c3ced18
-
SHA1
9d91e4cc3c59c258ae2655119692c13c899d68d2
-
SHA256
142a30f9ba3c2e1efbdf15241721da3b20d7b6436761d3eaafdcc095dc681fc4
-
SHA512
935aed41fbc1bb42cdc4b2c10fd306286642428c017248a71297d7674439415a410464a75b0529eec4b7a98f052408afcde24a501f6970fa405d642aafadb6c6
-
SSDEEP
98304:D77Pmq33rE/JDLPWZADUGer7B6iY74M/mmlwXVZaFB:L+R/eZADUXR
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-