General
-
Target
options.ini
-
Size
630B
-
Sample
240427-zhdp4sga36
-
MD5
e66b27f87ba051fd233cee09dea73a8e
-
SHA1
2e980bfa0ff64574fd10ea29824ce1c67699fb78
-
SHA256
0796c3bde70f1089517bbb566478028fe39d11a6d4d74cd559e7fc9a544f9dad
-
SHA512
9a8fb8906b31cff717cd6f69cc905bef850a4242dd6739fee9e21c095f8dbbe30923a58b4bf728bb42a4f512e68dadc8e16d5988cededa1032e8d5ba10e2e29c
Static task
static1
Behavioral task
behavioral1
Sample
options.ini
Resource
win11-20240426-en
Malware Config
Targets
-
-
Target
options.ini
-
Size
630B
-
MD5
e66b27f87ba051fd233cee09dea73a8e
-
SHA1
2e980bfa0ff64574fd10ea29824ce1c67699fb78
-
SHA256
0796c3bde70f1089517bbb566478028fe39d11a6d4d74cd559e7fc9a544f9dad
-
SHA512
9a8fb8906b31cff717cd6f69cc905bef850a4242dd6739fee9e21c095f8dbbe30923a58b4bf728bb42a4f512e68dadc8e16d5988cededa1032e8d5ba10e2e29c
Score8/10-
Downloads MZ/PE file
-
Executes dropped EXE
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-