General

  • Target

    kernelmode.zip

  • Size

    41.4MB

  • MD5

    365a91b0bc306839d4b2f1b67bb856c9

  • SHA1

    fb671a0c03a87d24e4803fc554be9401db59dfe2

  • SHA256

    337fe31673cd2ab1bc8ac80edc0e667155923c8f12c26112becdbd2b042b089d

  • SHA512

    c14d37e8240ddac1c022b626701346be5f056e8bb1b74fee1a108ad8666fe47136d8caac0192f4553e6f17ad192e3700dff5044041335388dda5230d096c8afc

  • SSDEEP

    786432:LTDep4kDqaRoCT/7rIILAqHwtcGyInvvsWnw4RWtp5ZA/GDfY:LfzFCHr7ARcRIvpCIGDw

Score
3/10

Malware Config

Signatures

  • Unsigned PE 3 IoCs

    Checks for missing Authenticode signature.

Files

  • kernelmode.zip
    .zip

    Password: Vayzer

  • kernelmode/goosext.exe
    .exe windows:6 windows x64 arch:x64

    Password: Vayzer

    1f0230d852ffc4fcc9411ae654a24300


    Headers

    Imports

    Sections

  • kernelmode/kernelmode.sys
    .sys windows:10 windows x64 arch:x64

    13fcff0e0da006b212f6c2c9c4c02307


    Headers

    Imports

    Sections

  • kernelmode/spoofer.exe
    .exe windows:6 windows x86 arch:x86

    Password: Vayzer

    f1c52c90a5b6647e52c5b257defcfe84


    Headers

    Imports

    Sections