General
-
Target
sample
-
Size
19KB
-
Sample
240522-tdjsnsgd85
-
MD5
2649ef263ff8134bdf7ec5272e53d97f
-
SHA1
6fe8403f0b004d7546294030effd6bcbcf0d3ce6
-
SHA256
0c5992518157a854b06d4641cbad3993f5d2137b021e7a26587265620624b550
-
SHA512
4ae6d3127cedf52f75564c3fe5ab68eccafc3bab89f352dc9e978f1e2f4adec74ac2e6be371edecfeed221c8338cc1c097d300474be828addaf3fd3b8e9a0ad6
-
SSDEEP
384:r7Zldc3vasDpmReVoOs4Mi9ylKeGM2U8Hhhbqdy7Qo2paWhOwob06++IJCgMmV6:rNcisBVoOs4MmyI1McBhb+UZWhOwob0w
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
sample
-
Size
19KB
-
MD5
2649ef263ff8134bdf7ec5272e53d97f
-
SHA1
6fe8403f0b004d7546294030effd6bcbcf0d3ce6
-
SHA256
0c5992518157a854b06d4641cbad3993f5d2137b021e7a26587265620624b550
-
SHA512
4ae6d3127cedf52f75564c3fe5ab68eccafc3bab89f352dc9e978f1e2f4adec74ac2e6be371edecfeed221c8338cc1c097d300474be828addaf3fd3b8e9a0ad6
-
SSDEEP
384:r7Zldc3vasDpmReVoOs4Mi9ylKeGM2U8Hhhbqdy7Qo2paWhOwob06++IJCgMmV6:rNcisBVoOs4MmyI1McBhb+UZWhOwob0w
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-