General
-
Target
9ae141812da4b60813ab4968427f33f179d76007b7af05d6508815280d146c71
-
Size
41KB
-
Sample
240430-at2hwaeh63
-
MD5
0d3eaa3ffa68d3ff6d26937f93eaf5fe
-
SHA1
aa2817ed70328cfc8ceb6bf37620ec3d289f683d
-
SHA256
9ae141812da4b60813ab4968427f33f179d76007b7af05d6508815280d146c71
-
SHA512
8cc4d258c6ba2d846dd435fcd5483ba1168294af4366a1b07eb127a1418b337cf647c9604d737c540c8b0b44b296392048d6cc53dd3e5bd0e238b3595eea193f
-
SSDEEP
768:DeMc5VwWt1jDkbXdnTOyQxHFO+IxX2P5LIbbcPYir2lAqcdF0i09CyH:Dq5VwWDjDkdTRqHFOn8tIbbeYiuZIFSD
Static task
static1
Behavioral task
behavioral1
Sample
9ae141812da4b60813ab4968427f33f179d76007b7af05d6508815280d146c71.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9ae141812da4b60813ab4968427f33f179d76007b7af05d6508815280d146c71.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
9ae141812da4b60813ab4968427f33f179d76007b7af05d6508815280d146c71
-
Size
41KB
-
MD5
0d3eaa3ffa68d3ff6d26937f93eaf5fe
-
SHA1
aa2817ed70328cfc8ceb6bf37620ec3d289f683d
-
SHA256
9ae141812da4b60813ab4968427f33f179d76007b7af05d6508815280d146c71
-
SHA512
8cc4d258c6ba2d846dd435fcd5483ba1168294af4366a1b07eb127a1418b337cf647c9604d737c540c8b0b44b296392048d6cc53dd3e5bd0e238b3595eea193f
-
SSDEEP
768:DeMc5VwWt1jDkbXdnTOyQxHFO+IxX2P5LIbbcPYir2lAqcdF0i09CyH:Dq5VwWDjDkdTRqHFOn8tIbbeYiuZIFSD
Score9/10-
UPX dump on OEP (original entry point)
-
Drops file in Drivers directory
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-