General
-
Target
098de707006e51720fdabf6b29bbd7ed6cc542c62ec19c6b104c4cc3a7289c59
-
Size
7.2MB
-
Sample
240522-sv716afg95
-
MD5
643921cac760b978cad19942c52976ce
-
SHA1
43f5a6f4716b9a00177c0deb9aaed2be12ca8283
-
SHA256
098de707006e51720fdabf6b29bbd7ed6cc542c62ec19c6b104c4cc3a7289c59
-
SHA512
c12336685d997d31eb9912506b0951c8ea38e9fa679ed6c27a549f747eed4a1fcc2d84c31c395128398769a69858096e3474a70e06f05e308fe826921f550cd1
-
SSDEEP
196608:8Rv44PE6K4+auUPFFPAaDbhkEaXtcg6UuYl3mKCr:CPw4J9lv2fttPl+r
Behavioral task
behavioral1
Sample
098de707006e51720fdabf6b29bbd7ed6cc542c62ec19c6b104c4cc3a7289c59.exe
Resource
win7-20240215-en
Malware Config
Targets
-
-
Target
098de707006e51720fdabf6b29bbd7ed6cc542c62ec19c6b104c4cc3a7289c59
-
Size
7.2MB
-
MD5
643921cac760b978cad19942c52976ce
-
SHA1
43f5a6f4716b9a00177c0deb9aaed2be12ca8283
-
SHA256
098de707006e51720fdabf6b29bbd7ed6cc542c62ec19c6b104c4cc3a7289c59
-
SHA512
c12336685d997d31eb9912506b0951c8ea38e9fa679ed6c27a549f747eed4a1fcc2d84c31c395128398769a69858096e3474a70e06f05e308fe826921f550cd1
-
SSDEEP
196608:8Rv44PE6K4+auUPFFPAaDbhkEaXtcg6UuYl3mKCr:CPw4J9lv2fttPl+r
-
Detect Blackmoon payload
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-