General
-
Target
HK416-bonk.mp4
-
Size
93KB
-
Sample
240224-prj85sbf84
-
MD5
f7aaecedf1d24e05de0641cd686cd075
-
SHA1
ab7e8b802dc8d406ba093c721d1cc88fc7aaa9df
-
SHA256
893a864ee28a6ca677a90873099a6f816e7fbb8e604f7fc9e4ffa90167d61001
-
SHA512
a9ebc2e5fa1e74c954cf1e944eecd32b2cc30e0f9a9055747bf47f01f5bc02f42b72cde72f72d7ddc1c82d7108956371a84c35eb007a90ad7b446e2891dbda88
-
SSDEEP
1536:z8iPfqSSI9UQGo7BxnZQOdtzqNVQNolHuesWrOWD7wZX42NtOSP7T8F4D7q9fU8x:giPfZo4ZhtONqNkHuesZUiX42VXJ3CUO
Static task
static1
Behavioral task
behavioral1
Sample
HK416-bonk.mp4
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
HK416-bonk.mp4
Resource
win10v2004-20240221-en
Malware Config
Targets
-
-
Target
HK416-bonk.mp4
-
Size
93KB
-
MD5
f7aaecedf1d24e05de0641cd686cd075
-
SHA1
ab7e8b802dc8d406ba093c721d1cc88fc7aaa9df
-
SHA256
893a864ee28a6ca677a90873099a6f816e7fbb8e604f7fc9e4ffa90167d61001
-
SHA512
a9ebc2e5fa1e74c954cf1e944eecd32b2cc30e0f9a9055747bf47f01f5bc02f42b72cde72f72d7ddc1c82d7108956371a84c35eb007a90ad7b446e2891dbda88
-
SSDEEP
1536:z8iPfqSSI9UQGo7BxnZQOdtzqNVQNolHuesWrOWD7wZX42NtOSP7T8F4D7q9fU8x:giPfZo4ZhtONqNkHuesZUiX42VXJ3CUO
Score6/10-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-