General
-
Target
Vulkan (5).zip
-
Size
272KB
-
Sample
240305-sgbe2aae98
-
MD5
a7e2f1cb01fa11556728839ce618a86a
-
SHA1
4679ca7bcddcb065dcee001d68416f2441fcae35
-
SHA256
0b8f6828dd6e5457671a799456e45e9a4a1e26a9f120d563cfb05d5e13f20196
-
SHA512
00298f12f2a6144ce43e266f6c74376b2fac52d355f9c997e3cdad24651662adefac7051fc051d9ebcc3ce6eeb9f85b99572f2f777a46b5c650994bf1d028d29
-
SSDEEP
6144:oOrsuyQR0IUK1lJlaosg8khgtA0000Lyxpo/Wvs:ovk1vU9g8Ltp50LSpvU
Static task
static1
Behavioral task
behavioral1
Sample
Vulkan/Assets/Bootstrapper.exe
Resource
win10-20240221-en
Behavioral task
behavioral2
Sample
Vulkan/Launch.lnk
Resource
win10-20240221-en
Malware Config
Targets
-
-
Target
Vulkan/Assets/Bootstrapper.exe
-
Size
198KB
-
MD5
3a61d18866ec289415e213ab5d34de69
-
SHA1
83c29a47600dc00feb87954418e3873edd42e4aa
-
SHA256
e5807f713d9b89a54c8916d30705401e82c83b74a3b195db5b399e90ff945ce1
-
SHA512
a88d52d94acf8ee8858bad9dadebadd7c0d09572f459f28d01fef35c9dd1b5af51a96a2b13b4b5fbea8e483c2832d3a6d4a0cc9b60ebbe343a8c65c0de8d2ed4
-
SSDEEP
1536:96R6ONuvr2zhBIEMUkwV/n1EnXONHLfE6XZ3bU9dbJOOI:buh/fP1EXyzsOT
Score7/10-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
-
-
Target
Vulkan/Launch.lnk
-
Size
1KB
-
MD5
b0c64121ad2b9c9db52db5ceef6c7a73
-
SHA1
aa893decdb1a86a09687cb8a9aa19a686643ddc0
-
SHA256
347f03b54b58fa6806711253195ca8ea44679c7a8a3af8a262b1347248d36953
-
SHA512
3effa3659cf3c5b27100f4c1f025a1d9711ac8a7f93463dc815dd258bfd6ff1906d68de39f9670b79112fd1b68a89ec8f409409313cabb717b4f5eb97556b63d
Score7/10-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-