General
-
Target
error422(1).zip
-
Size
203.3MB
-
Sample
240311-z9q5hsgh26
-
MD5
47ae8d31244b792e8168e359ebb0ca56
-
SHA1
9b079716b1b0c8e86887d8cd79b4d33c4aaa29ff
-
SHA256
63bfdf16183fc6ba3aac2ccc86b3368445e448d2a50386a9dfeb88b8b7ff567d
-
SHA512
4267b0221a0ab81faf12e2ab9e2b77567747cb9a1fcadb6c0a4484feea1c362a531a7d98366435d4a139b56cd8577122b144e871915413e1cd73bd5739b03525
-
SSDEEP
6291456:alruI9iSD/RcG2Oxy0yERVDVzuSfnaxd1q3w4ZwIOhjIgn:UruIJDmGngiDbvoPq37Zmhtn
Static task
static1
Behavioral task
behavioral1
Sample
error422(1).exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
jdk-8u191-windows-i586.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
error422(1).exe
-
Size
8.0MB
-
MD5
7b01e76578486d44bbafb0d51381820e
-
SHA1
0daa6b605200bf6fabd7a08f7de4c1eac4fd12d9
-
SHA256
7765f79269ebad7f33a0dc8d18360f5adf9464660f2259f9961cad0aa2f94bbd
-
SHA512
0c6d84c197713b3c8ab12bf23e1d6d828eca1cf7e11a047de0856046974abb2e297899c8a3c445a206c80fc963919a3cecaf8b5c336a349b821eb1df013a7c92
-
SSDEEP
196608:GiF+hNQl6gsLxL8QpNpKyro8thPVNadB:oC0bx5pTKs1JadB
Score1/10 -
-
-
Target
jdk-8u191-windows-i586.exe
-
Size
197.3MB
-
MD5
50cfd28a3a3243bc5e9be096a3b9fd97
-
SHA1
bc8f26edb5d1b6d93459405da76bc52c9b882e69
-
SHA256
a92fce986622e9846b93e396a7eda6214e7f7ea90860794c934f423c10813622
-
SHA512
859e7cc427a5ea990dd3b5301d0bb68aceac9b32f62363d5d21ed90ad45a7a7912d201dc276786bfcfb18a8683776623c7b78c4ad06c4f8002033bfaa6e8855e
-
SSDEEP
6291456:TRcAp+FfSMhbAOo8ZycQv15tZ8YpG+sdjjceHAk8iaKmh:TRcAp4SWAURo5MAHojjjHEiaT
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-