General
-
Target
thegreatestexploit.exe
-
Size
17.9MB
-
Sample
240530-qsqyrabd38
-
MD5
985a7c5f0ee35a1984ed8b0c18847643
-
SHA1
2bf0487f62ef4a521d3d51b01a4b8b2625de2a91
-
SHA256
15aa7b28eb003b5bfea6679de772a34e59372f2155a87ba8f05ce8c4118e2e3e
-
SHA512
9230cf00c8145e199586e478e7db307e75d729b98af24ec1b73e4893348380bd81affe436bee7aea8dc2e1b22d0b7e49af98428756a5832df22f5411e6e7a7d8
-
SSDEEP
393216:qtabzFXC2ZKqm6GhXcrRwBsoM8km9XWkdQctnGHS4sak:5blKqm6GmSBs12Gkd/tG
Static task
static1
Behavioral task
behavioral1
Sample
thegreatestexploit.exe
Resource
win11-20240419-en
Malware Config
Targets
-
-
Target
thegreatestexploit.exe
-
Size
17.9MB
-
MD5
985a7c5f0ee35a1984ed8b0c18847643
-
SHA1
2bf0487f62ef4a521d3d51b01a4b8b2625de2a91
-
SHA256
15aa7b28eb003b5bfea6679de772a34e59372f2155a87ba8f05ce8c4118e2e3e
-
SHA512
9230cf00c8145e199586e478e7db307e75d729b98af24ec1b73e4893348380bd81affe436bee7aea8dc2e1b22d0b7e49af98428756a5832df22f5411e6e7a7d8
-
SSDEEP
393216:qtabzFXC2ZKqm6GhXcrRwBsoM8km9XWkdQctnGHS4sak:5blKqm6GmSBs12Gkd/tG
Score8/10-
Downloads MZ/PE file
-
Sets file execution options in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Registers COM server for autorun
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-