General
-
Target
main.py
-
Size
6KB
-
Sample
240408-phwktacc41
-
MD5
78fb568e91f2d1df429d2b3bc07ebe0d
-
SHA1
fd514858dfb76295c6098dc3dee964223db39b7c
-
SHA256
faee5fdcad30f9f2ac56aaf07613de9b9f2981d37fd5000b7083635e9aaebb17
-
SHA512
3e21519802c78b3f7ffdc20f64c8a4a52e3adb117cf7621b2baee5b9c05d3a083f7ea681e66a7cbbdb4ef46be3c1da9c3131057d17801ba6e8f2f086962480da
-
SSDEEP
192:vtZM2zZ2zkuwXvC3KOz2KUz9gfT+d2z9yp2a:lZzQJev5OK/6CIhyUa
Static task
static1
Behavioral task
behavioral1
Sample
main.py
Resource
win10-20240404-en
Malware Config
Targets
-
-
Target
main.py
-
Size
6KB
-
MD5
78fb568e91f2d1df429d2b3bc07ebe0d
-
SHA1
fd514858dfb76295c6098dc3dee964223db39b7c
-
SHA256
faee5fdcad30f9f2ac56aaf07613de9b9f2981d37fd5000b7083635e9aaebb17
-
SHA512
3e21519802c78b3f7ffdc20f64c8a4a52e3adb117cf7621b2baee5b9c05d3a083f7ea681e66a7cbbdb4ef46be3c1da9c3131057d17801ba6e8f2f086962480da
-
SSDEEP
192:vtZM2zZ2zkuwXvC3KOz2KUz9gfT+d2z9yp2a:lZzQJev5OK/6CIhyUa
Score8/10-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Registers COM server for autorun
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-