General
-
Target
Рабочий стол.exe
-
Size
11.3MB
-
Sample
240525-znaweaaa4w
-
MD5
bc4575a3ebd819e129153cd93605180f
-
SHA1
0f366c788ccde441d672645761fa4fa083c3a171
-
SHA256
11b93e34331790f9637d310f9a273582a1a6d57343f6f33db9fd857e8fca73df
-
SHA512
da883ef545c81d7918c9a13a74afe418cbdbe6375a492622741c4ecbd18ed64a7bc41f5be11dc4fed64d15252cf4078be555c9b8e0003da3745e687b5d52e6f4
-
SSDEEP
196608:PmbGyGFKQiBMlx9JBa+5py+snRqFSi9j/vrLNwqZbeVrfJQxYrPTrDiI7M:IVGFKQimlx9HhjqnRqweYPrPTij
Static task
static1
Behavioral task
behavioral1
Sample
Рабочий стол.exe
Resource
win10-20240404-en
Malware Config
Targets
-
-
Target
Рабочий стол.exe
-
Size
11.3MB
-
MD5
bc4575a3ebd819e129153cd93605180f
-
SHA1
0f366c788ccde441d672645761fa4fa083c3a171
-
SHA256
11b93e34331790f9637d310f9a273582a1a6d57343f6f33db9fd857e8fca73df
-
SHA512
da883ef545c81d7918c9a13a74afe418cbdbe6375a492622741c4ecbd18ed64a7bc41f5be11dc4fed64d15252cf4078be555c9b8e0003da3745e687b5d52e6f4
-
SSDEEP
196608:PmbGyGFKQiBMlx9JBa+5py+snRqFSi9j/vrLNwqZbeVrfJQxYrPTrDiI7M:IVGFKQimlx9HhjqnRqweYPrPTij
Score8/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Registers COM server for autorun
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-