General
-
Target
d08c7d868b6f93df6263542b58afb2af56c51d223e7b293512585bdfc4717847
-
Size
41KB
-
Sample
240421-dn1aeahg3w
-
MD5
3ec9ad75005d7d0ba35f15c1cba18b94
-
SHA1
5b116311fd73c4a84137fb3d40d78fb27add7f09
-
SHA256
d08c7d868b6f93df6263542b58afb2af56c51d223e7b293512585bdfc4717847
-
SHA512
02eb6f5b64657bed07f4b9c7c3aa6bc6f7aa17358552b517f0d6348b6f41e089a4a252145b7f22be1722e88dc9f88d2d015135f2b40a47fbdd1e9de1e5f13726
-
SSDEEP
768:8eMc5VwWt1jDkbXdnTOyQxHFO+IxX2P5LIbbcPYir2lAqcdF0i09syp:8q5VwWDjDkdTRqHFOn8tIbbeYiuZIFSL
Static task
static1
Behavioral task
behavioral1
Sample
d08c7d868b6f93df6263542b58afb2af56c51d223e7b293512585bdfc4717847.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d08c7d868b6f93df6263542b58afb2af56c51d223e7b293512585bdfc4717847.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
d08c7d868b6f93df6263542b58afb2af56c51d223e7b293512585bdfc4717847
-
Size
41KB
-
MD5
3ec9ad75005d7d0ba35f15c1cba18b94
-
SHA1
5b116311fd73c4a84137fb3d40d78fb27add7f09
-
SHA256
d08c7d868b6f93df6263542b58afb2af56c51d223e7b293512585bdfc4717847
-
SHA512
02eb6f5b64657bed07f4b9c7c3aa6bc6f7aa17358552b517f0d6348b6f41e089a4a252145b7f22be1722e88dc9f88d2d015135f2b40a47fbdd1e9de1e5f13726
-
SSDEEP
768:8eMc5VwWt1jDkbXdnTOyQxHFO+IxX2P5LIbbcPYir2lAqcdF0i09syp:8q5VwWDjDkdTRqHFOn8tIbbeYiuZIFSL
Score9/10-
UPX dump on OEP (original entry point)
-
Drops file in Drivers directory
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-