General
-
Target
f586d2af97b0b0b3d04d749d09e1ea7564426e0708c4af06a2de6a85f517fc0b
-
Size
240KB
-
Sample
240515-fl4wxsac5t
-
MD5
103c08811d292da2ed17fb1f80a78f8e
-
SHA1
f4b0b262fb47443660d9be1a0e46efdec16c163d
-
SHA256
f586d2af97b0b0b3d04d749d09e1ea7564426e0708c4af06a2de6a85f517fc0b
-
SHA512
24cc1cd301ef9ee616d94d9f3d7b811115e3191b2ec039a150d47a1e23e6f7f381aa5ce3eead30ea4162382b0a8406372fb8b832d872b24f2119a2f2441dffdd
-
SSDEEP
1536:6q5VwWDjDkdTRqHFOn8tIbbeYiuZIFS9bB:6q5ud9qHFO8Kf3rIIbB
Static task
static1
Behavioral task
behavioral1
Sample
f586d2af97b0b0b3d04d749d09e1ea7564426e0708c4af06a2de6a85f517fc0b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f586d2af97b0b0b3d04d749d09e1ea7564426e0708c4af06a2de6a85f517fc0b.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
f586d2af97b0b0b3d04d749d09e1ea7564426e0708c4af06a2de6a85f517fc0b
-
Size
240KB
-
MD5
103c08811d292da2ed17fb1f80a78f8e
-
SHA1
f4b0b262fb47443660d9be1a0e46efdec16c163d
-
SHA256
f586d2af97b0b0b3d04d749d09e1ea7564426e0708c4af06a2de6a85f517fc0b
-
SHA512
24cc1cd301ef9ee616d94d9f3d7b811115e3191b2ec039a150d47a1e23e6f7f381aa5ce3eead30ea4162382b0a8406372fb8b832d872b24f2119a2f2441dffdd
-
SSDEEP
1536:6q5VwWDjDkdTRqHFOn8tIbbeYiuZIFS9bB:6q5ud9qHFO8Kf3rIIbB
Score9/10-
UPX dump on OEP (original entry point)
-
Drops file in Drivers directory
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-