General
-
Target
logger.py
-
Size
1KB
-
Sample
240220-cg9d3ahc7t
-
MD5
23be5a96267554695b19934f71f759ea
-
SHA1
3e46c4eb8bf5604c246821b25c588136c3de34b7
-
SHA256
45093d1b0708012ab39786b79122fc62c1d1c31bb05d5c521e36278dd6c46dcb
-
SHA512
cf2d59cdad1f4bfe1c2396a7933d097b488d7f992bdbaafb5f9d50f9f908eb8f913fa2589c633384f870921fab09f4f4382d26ab2033c4e84f9b826cff67388a
Static task
static1
Behavioral task
behavioral1
Sample
logger.py
Resource
win11-20240214-en
Malware Config
Targets
-
-
Target
logger.py
-
Size
1KB
-
MD5
23be5a96267554695b19934f71f759ea
-
SHA1
3e46c4eb8bf5604c246821b25c588136c3de34b7
-
SHA256
45093d1b0708012ab39786b79122fc62c1d1c31bb05d5c521e36278dd6c46dcb
-
SHA512
cf2d59cdad1f4bfe1c2396a7933d097b488d7f992bdbaafb5f9d50f9f908eb8f913fa2589c633384f870921fab09f4f4382d26ab2033c4e84f9b826cff67388a
Score8/10-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Registers COM server for autorun
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-