General
-
Target
694f46b7d707925e0644b8c980f9e6b3f25aeffec4dbe7f6f71e831f877e34ba
-
Size
119KB
-
Sample
240420-2yr9jscb74
-
MD5
0cb976bfe4484969e29a2633db49f8cb
-
SHA1
4b5ff6f9420de0387a0df421c411b74658e1e6c0
-
SHA256
694f46b7d707925e0644b8c980f9e6b3f25aeffec4dbe7f6f71e831f877e34ba
-
SHA512
3192cef40d5065a1f549f1aed76a7fe59f3e06989bea79bc062fe29375e647356110262c1fe9461933c38fd41505171e87c3c06233dbb5e60dc46af39ba8cb59
-
SSDEEP
3072:oOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPh:oIs9OKofHfHTXQLzgvnzHPowYbvrjD/E
Static task
static1
Behavioral task
behavioral1
Sample
694f46b7d707925e0644b8c980f9e6b3f25aeffec4dbe7f6f71e831f877e34ba.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
694f46b7d707925e0644b8c980f9e6b3f25aeffec4dbe7f6f71e831f877e34ba.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
694f46b7d707925e0644b8c980f9e6b3f25aeffec4dbe7f6f71e831f877e34ba
-
Size
119KB
-
MD5
0cb976bfe4484969e29a2633db49f8cb
-
SHA1
4b5ff6f9420de0387a0df421c411b74658e1e6c0
-
SHA256
694f46b7d707925e0644b8c980f9e6b3f25aeffec4dbe7f6f71e831f877e34ba
-
SHA512
3192cef40d5065a1f549f1aed76a7fe59f3e06989bea79bc062fe29375e647356110262c1fe9461933c38fd41505171e87c3c06233dbb5e60dc46af39ba8cb59
-
SSDEEP
3072:oOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPh:oIs9OKofHfHTXQLzgvnzHPowYbvrjD/E
Score9/10-
UPX dump on OEP (original entry point)
-
Drops file in Drivers directory
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-