General
-
Target
8a0a5c84a0e0f1f04847cec62beee856
-
Size
4.0MB
-
Sample
240202-ve2wbadacp
-
MD5
8a0a5c84a0e0f1f04847cec62beee856
-
SHA1
17bde1bc65f16c052724dbec0ca8eebff1683a65
-
SHA256
20b50cfce59e35276a70069a6b8fc338b9dd121b4dde7e51b853054dd66eac44
-
SHA512
25204acfb08883bcfaf86dcc5eb6069c0694ed9ec93ec7bb459a11a79d567d365431ca1cb277dfe3bfbeac3f1486b475bdc7f3c4e5ba7f29e1a5c09d4ffab6ce
-
SSDEEP
98304:hR+VT8kLkC70KYaotcJQCYmMcGGwfSQT8ujb/h:OVToCQKYPiJQSQhqJujbJ
Static task
static1
Behavioral task
behavioral1
Sample
8a0a5c84a0e0f1f04847cec62beee856.exe
Resource
win7-20231215-en
Malware Config
Targets
-
-
Target
8a0a5c84a0e0f1f04847cec62beee856
-
Size
4.0MB
-
MD5
8a0a5c84a0e0f1f04847cec62beee856
-
SHA1
17bde1bc65f16c052724dbec0ca8eebff1683a65
-
SHA256
20b50cfce59e35276a70069a6b8fc338b9dd121b4dde7e51b853054dd66eac44
-
SHA512
25204acfb08883bcfaf86dcc5eb6069c0694ed9ec93ec7bb459a11a79d567d365431ca1cb277dfe3bfbeac3f1486b475bdc7f3c4e5ba7f29e1a5c09d4ffab6ce
-
SSDEEP
98304:hR+VT8kLkC70KYaotcJQCYmMcGGwfSQT8ujb/h:OVToCQKYPiJQSQhqJujbJ
-
Checks for common network interception software
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-