General
-
Target
dino.zip
-
Size
4.3MB
-
Sample
240405-skcr9sfc7s
-
MD5
79c0e07bfb5c10fa779e20c7c6a9cd4a
-
SHA1
615323f26c94ec00f4745bfc160a4ee817b38ac8
-
SHA256
e3ff5ca6952b263f1e3280b8ac648316a25fe1b5be45dae11317918d8856612a
-
SHA512
ae5ddce0e2140efcb4a84808ca0503c919ab2774de0a67fd7b5e64adb6e1c54170eec31076240c958807b20f1f7a8e3fdbdf2fbbee66a990acbb3c3b04b91437
-
SSDEEP
98304:RNyb3xf3mfebfqQUlRIMLkeld53E//jY4HJ7PhPwsmkyO:RNyf2foqQUHIMLkelLs5xd9
Static task
static1
Behavioral task
behavioral1
Sample
dino.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dino.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
launcher.bat
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
launcher.bat
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
dino.dll
-
Size
5.5MB
-
MD5
f302435807a6a769728d89ac4fc1bd43
-
SHA1
c6ea54068d7deaeb3fc3c31edd3c336b804505db
-
SHA256
d98cd810d568f338f16c4637e8a9cb01ff69ee1967f4cfc004de3f283d61ba81
-
SHA512
dfd72aa484547da9b463e54fbb81bdb48597aaaff74015735d896d5348c86114210eec6d3e2069608e341dc4f37f305e9716a2cf8d1d6f00edcbc76668945e08
-
SSDEEP
98304:p0nxA1cmzOfO8fv1CPwDv3uFhaYtQBPoqahqLVfK7vVFw6bIRpACgv5IgpYObtJT:2dmCf/fv1CPwDv3uFhaoQBPolhqL9Kbd
Score3/10 -
-
-
Target
launcher.bat
-
Size
87B
-
MD5
864189b29e0ee9338690f34f60d9ed61
-
SHA1
2f130b692da72031ca0089894b84d716319c3b9a
-
SHA256
6887bbcea8d76ccb3cdf324d5a7b0feea4a7bbc17e4c05c9e7e07c735ba565a4
-
SHA512
957853c8a9a67d0555ddeb3981440d9709ff2762a4e4ae7cf48bc2a8a4cb9304154b696411ea4a521871b8322bdb433fd36988e230b91d1656f6c0c8488abafb
Score8/10-
Blocklisted process makes network request
-
Dave packer
Detects executable using a packer named 'Dave' by the community, based on a string at the end.
-