General
-
Target
0d8b7479bd9156032cf3287faee1807e96d68c7bce3835c7e3435951446bade1.exe
-
Size
783KB
-
Sample
240503-bjkcaadc47
-
MD5
6775321bbbe02737daff72cbfef1d3a5
-
SHA1
778fb1443b71b7afbf8965d6fad12247c7e2befc
-
SHA256
0d8b7479bd9156032cf3287faee1807e96d68c7bce3835c7e3435951446bade1
-
SHA512
0970f311b772c014384a17d0c3b51a47f7046096d2d140db7fbe665087369fde3123c77283304121ac37517a3aa117787c42914884ec82f985ddf88c7531b810
-
SSDEEP
12288:DrC48OWaxjjtjj9bHGMIvxV7G5iMOQrLTI9AVZ/RZF:H7/jxjjtjj9JIvxV7G5iMN/0GZ/RZF
Static task
static1
Behavioral task
behavioral1
Sample
0d8b7479bd9156032cf3287faee1807e96d68c7bce3835c7e3435951446bade1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0d8b7479bd9156032cf3287faee1807e96d68c7bce3835c7e3435951446bade1.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
Attn104/Jiber/Superintendentens/Chaptaliseringernes.ps1
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Attn104/Jiber/Superintendentens/Chaptaliseringernes.ps1
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
0d8b7479bd9156032cf3287faee1807e96d68c7bce3835c7e3435951446bade1.exe
-
Size
783KB
-
MD5
6775321bbbe02737daff72cbfef1d3a5
-
SHA1
778fb1443b71b7afbf8965d6fad12247c7e2befc
-
SHA256
0d8b7479bd9156032cf3287faee1807e96d68c7bce3835c7e3435951446bade1
-
SHA512
0970f311b772c014384a17d0c3b51a47f7046096d2d140db7fbe665087369fde3123c77283304121ac37517a3aa117787c42914884ec82f985ddf88c7531b810
-
SSDEEP
12288:DrC48OWaxjjtjj9bHGMIvxV7G5iMOQrLTI9AVZ/RZF:H7/jxjjtjj9JIvxV7G5iMN/0GZ/RZF
Score10/10-
Adds Run key to start application
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
-
-
Target
Attn104/Jiber/Superintendentens/Chaptaliseringernes.Kro
-
Size
59KB
-
MD5
7a00c4088c123d61422f4fe0db41bd24
-
SHA1
8dcb56788e82418c69556771808bb6c7b977067f
-
SHA256
b7d771d62b14d618608d7541302035b824e69cee7a497ab326a14e7562800f3a
-
SHA512
e5c309d5d1cec2083750e242d901f8bdc3a845018603f6ed16436f65ebda2e1e7f5978ac3dc838199cae22ab7b0c12c930cf941bb25c33886731d76c5598ae37
-
SSDEEP
1536:YZzbiRU2WUoHhEBe6aOe0P2vG2Ib4OO5S3oaT:gzbUUnU2hmVaM2vR7NS3d
Score8/10-
Modifies Installed Components in the registry
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-