General
-
Target
d612dec7da448b16b1c8b70aefcef06ed4cbeddfbdddb7cbe2c1f0afdf714056
-
Size
118KB
-
Sample
240516-ehpgdsba6w
-
MD5
50e7fbe000ff3fc25eac772e6cdc33ed
-
SHA1
eea72c5aaffcaa4e69dfa7fda8dc7a4ec71f4650
-
SHA256
d612dec7da448b16b1c8b70aefcef06ed4cbeddfbdddb7cbe2c1f0afdf714056
-
SHA512
9fcefdeeceb5c5def966deb19df388553cfe200ddd163efba3c939639b5571380fe32e45731e92dfdd01d9a5ac9499e09f2318755fb9129109563228d8f25af7
-
SSDEEP
3072:OOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPb:OIs9OKofHfHTXQLzgvnzHPowYbvrjD/m
Static task
static1
Behavioral task
behavioral1
Sample
d612dec7da448b16b1c8b70aefcef06ed4cbeddfbdddb7cbe2c1f0afdf714056.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
d612dec7da448b16b1c8b70aefcef06ed4cbeddfbdddb7cbe2c1f0afdf714056.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
d612dec7da448b16b1c8b70aefcef06ed4cbeddfbdddb7cbe2c1f0afdf714056
-
Size
118KB
-
MD5
50e7fbe000ff3fc25eac772e6cdc33ed
-
SHA1
eea72c5aaffcaa4e69dfa7fda8dc7a4ec71f4650
-
SHA256
d612dec7da448b16b1c8b70aefcef06ed4cbeddfbdddb7cbe2c1f0afdf714056
-
SHA512
9fcefdeeceb5c5def966deb19df388553cfe200ddd163efba3c939639b5571380fe32e45731e92dfdd01d9a5ac9499e09f2318755fb9129109563228d8f25af7
-
SSDEEP
3072:OOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPb:OIs9OKofHfHTXQLzgvnzHPowYbvrjD/m
Score9/10-
UPX dump on OEP (original entry point)
-
Drops file in Drivers directory
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-