General
-
Target
844d25a95681bdf377d72dc961fe7357.bin
-
Size
22KB
-
Sample
240504-bvzakshf9y
-
MD5
3888be9d2e69c7782f9617a1d7d415f4
-
SHA1
c14e2c0e600c5583bc077a446c13976d1c22afcf
-
SHA256
d160c20b7181b83d7f0457b8eae1726c0c47192c3df1ce79ca5ebb1f3da48aa4
-
SHA512
27009a4dfe5b1404328a87903a356c9395ed02fc9ea8187ba998782ae2b2df0b7fca9fcda49259a0950eaedfe77a7e18b41a8cfe7af3ef8896bc356db8a32df3
-
SSDEEP
384:DgIIy4RUitjU1r0XWneogRVbi/mo5g/vT3BRgv5VBjqRTxvf82IPDIVq1AlWfr09:dIpto1mo2Vu/95g/vT3UruxSs0ew6
Static task
static1
Behavioral task
behavioral1
Sample
fce215d41328ca3cc043df67cdd2adf2048e56a063dcf2ebc7b6d56c82a4b291.rtf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fce215d41328ca3cc043df67cdd2adf2048e56a063dcf2ebc7b6d56c82a4b291.rtf
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
fce215d41328ca3cc043df67cdd2adf2048e56a063dcf2ebc7b6d56c82a4b291.rtf
-
Size
79KB
-
MD5
844d25a95681bdf377d72dc961fe7357
-
SHA1
6d4af02a91d8ab9567dd01df5e951297187d825c
-
SHA256
fce215d41328ca3cc043df67cdd2adf2048e56a063dcf2ebc7b6d56c82a4b291
-
SHA512
c76fe2557fe314368144cdfdf85dfa6fd78c37d0dd25f4a91678828773ca3ebe355533444e0e5a288c25bd14281baa1d9cafd785a587cffbcba3e145c78ba760
-
SSDEEP
1536:Ekge5lutw2AC785LKTzfHO8txH8vznDuKqp6AQSO/ZBOACSb/m5wjeBQYVam/o:7ktw2Ao85LKTzfHOsB8r6V6AjO/ZBOAl
Score8/10-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-