General
-
Target
0e1262a4ce5ac71ad5b8df93030d61b5.bin
-
Size
395KB
-
Sample
240421-bcrg1sfa81
-
MD5
49a5eed257587d97f55775829d408c3d
-
SHA1
3860d4a19e98634fcddcee3b9985cf8d64bbd33f
-
SHA256
f33bceff393d14f948ad0a37dea51034f4951c0009060187d9d0ec7da5259ce7
-
SHA512
5a0fb61f0ed6e4b95b4bb498b6d8b5bf2583a115a8ffa81547a4ddcfd69f9e1f82b5730cced237f0ce83cc8e122de6ed792ef200fe94c030574a74ecf953d231
-
SSDEEP
6144:9Byd/vjsUM0WokEvivN3Rgr70nACayxCwI/BqR9MgvRj83+cW:ad/rsUM5EvEnavK9MSa+V
Static task
static1
Behavioral task
behavioral1
Sample
a90c7b4223bca6a28296894c66845de8fb61e7028b9c45ab8e0ec7d27db0bf71.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
a90c7b4223bca6a28296894c66845de8fb61e7028b9c45ab8e0ec7d27db0bf71.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
Kursusplans.ps1
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Kursusplans.ps1
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
a90c7b4223bca6a28296894c66845de8fb61e7028b9c45ab8e0ec7d27db0bf71.exe
-
Size
521KB
-
MD5
0e1262a4ce5ac71ad5b8df93030d61b5
-
SHA1
efb918ee62ff5cca7bdc10d180c7f7837c8e2b6b
-
SHA256
a90c7b4223bca6a28296894c66845de8fb61e7028b9c45ab8e0ec7d27db0bf71
-
SHA512
a799094bdae022e92f77c002dc03d0da004982aaa973efe35dc6e72e40a5e9549927c7a831331218bb15478f24cc0b7ed9e7d94a0d1f3aba103b49e68bd0064d
-
SSDEEP
12288:fzA/ggggjrBj93vPbk8tGtP7ocMzAGrP+jp:U/ggggj9jpvY84mAGrPu
Score6/10-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
-
-
Target
Kursusplans.Fje
-
Size
59KB
-
MD5
867b6e69eaf64d49c92a00efe2f3484a
-
SHA1
57e409c3c4ec17f05de4b6900300c6ffb22447c7
-
SHA256
554a9d36104f6fe2c57ebef379f96adb5205f4652780c0459db40e676f5efa1c
-
SHA512
3d075d6850562b2f68503e48f9349a50dcf65e69626b85b5312bf0bd6938b3b433cafb3ed4f885b392c4157b6997613ea551729a35028f5be1151ac3feda1856
-
SSDEEP
1536:oKohIDhrU/xqIsVWUQ7IQp0lYmDc+m4PsrHLc:oJhI5U/xKWLpwon4Ps7Lc
Score8/10-
Modifies Installed Components in the registry
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-