General
-
Target
Avatar.jpg
-
Size
171KB
-
Sample
240222-yv6qzsef3z
-
MD5
ad037a67341d2b3c169d449b913ec157
-
SHA1
bdbe4e1bc576a09ce86c7fc5b5695dd1d8e04364
-
SHA256
f849330882af205fbfb7ddcb71401547866f4d29da1034f503da48660cdc8e62
-
SHA512
e018dd5b5eb10703b474ab0d40e4f2a4f68c7c84372ca3176a1af7f898bb99d1ae826660ac70af2a4a731c53f9776fa71f99ba80f07365fa85f35f00302ddd68
-
SSDEEP
3072:pLK9fgqVsxDePCDlmDkwY2YsYqJHuCfDkwpbC4WTeZCI4ralQn:oTWlmYGpjDpuO4rPn
Static task
static1
Behavioral task
behavioral1
Sample
Avatar.jpg
Resource
win11-20240221-en
Malware Config
Targets
-
-
Target
Avatar.jpg
-
Size
171KB
-
MD5
ad037a67341d2b3c169d449b913ec157
-
SHA1
bdbe4e1bc576a09ce86c7fc5b5695dd1d8e04364
-
SHA256
f849330882af205fbfb7ddcb71401547866f4d29da1034f503da48660cdc8e62
-
SHA512
e018dd5b5eb10703b474ab0d40e4f2a4f68c7c84372ca3176a1af7f898bb99d1ae826660ac70af2a4a731c53f9776fa71f99ba80f07365fa85f35f00302ddd68
-
SSDEEP
3072:pLK9fgqVsxDePCDlmDkwY2YsYqJHuCfDkwpbC4WTeZCI4ralQn:oTWlmYGpjDpuO4rPn
Score8/10-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-