General
-
Target
Adjunto.Citacion.bLM7wu8.zip
-
Size
7.3MB
-
Sample
240222-zqhzssfe23
-
MD5
c18a95242b1cace64a2c72ada4e583b0
-
SHA1
d6a6e1a09a1c051ab0be2c9f5ccb7cca2964ddf4
-
SHA256
8362c40f76a76811833eac3aa8e8cc9106df5d4c220ad8dfd741379b43140b39
-
SHA512
c6e73631a7e5cf4c1aadf0d11942346d2044c2c9b0ef58718f6f6a89f440514ab99d05f432a9899feed1a4580a337bc0dffad1bc08e98c84c44ed0777cc8e44b
-
SSDEEP
196608:d2ljYcEflfxo+p5IoaLYrGty7vixOC6Zl+M/WxwTpul:d2ZpENpfTbrGI+xOCc+G/16
Static task
static1
Behavioral task
behavioral1
Sample
ADJUNTO.NOTIFICACION.PDF.RAAHVZM胥.msi
Resource
win7-20240221-es
Behavioral task
behavioral2
Sample
ADJUNTO.NOTIFICACION.PDF.RAAHVZM胥.msi
Resource
win10v2004-20240221-es
Malware Config
Targets
-
-
Target
ADJUNTO.NOTIFICACION.PDF.RAAHVZM胥.msi
-
Size
18.3MB
-
MD5
39ab87a54eee5e6355db9b90a184cc19
-
SHA1
9d25ee5118aa7ebd36bee60ab8d5fb2a85a60065
-
SHA256
9ece9122a0bd86fc01e16e707e8b16a8e6f213879a2d5c2af77f55a4f817b7ba
-
SHA512
48a40413d6d4c5dc244b5a0a388c43cf48392a3cb2bc6f1ac477e77b7c8dcea2b6a487e12dabb5526881fec56077e0cd4493ce2bf4c9b265ed10cb060878ebd9
-
SSDEEP
196608:L6kcyMHvfROCP3GM9vh7bze+/hXxptawzOEj/:L6kDMHXROCfB9Z7blraDE7
Score6/10-
Adds Run key to start application
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-