General
-
Target
u4wlg04us17.exe
-
Size
33.0MB
-
Sample
240604-yj6lvahe21
-
MD5
610bc83987252bee72673b6dda434320
-
SHA1
70940f50296d005257e5d0a6eb5268ec4272f3bd
-
SHA256
3a45c99413503a1ac0f76c4f2d7440a4695813fe6e7f849b8e867509a621b306
-
SHA512
da52015fd9b5e6d2fa357bd93a70005b6bc315d25674b16ead366a470a8da2ac26f99f969514b005ec11a1ed76cc0d089bc5646868941ed931152804928659e6
-
SSDEEP
786432:THzSL7458aS6dOH7nMZya2xBZWB1kSz34IO1iNhp9PsODGo:TTSLkfyaUPWjfO12Psg
Static task
static1
Behavioral task
behavioral1
Sample
u4wlg04us17.exe
Resource
win10v2004-20240508-es
Malware Config
Targets
-
-
Target
u4wlg04us17.exe
-
Size
33.0MB
-
MD5
610bc83987252bee72673b6dda434320
-
SHA1
70940f50296d005257e5d0a6eb5268ec4272f3bd
-
SHA256
3a45c99413503a1ac0f76c4f2d7440a4695813fe6e7f849b8e867509a621b306
-
SHA512
da52015fd9b5e6d2fa357bd93a70005b6bc315d25674b16ead366a470a8da2ac26f99f969514b005ec11a1ed76cc0d089bc5646868941ed931152804928659e6
-
SSDEEP
786432:THzSL7458aS6dOH7nMZya2xBZWB1kSz34IO1iNhp9PsODGo:TTSLkfyaUPWjfO12Psg
Score8/10-
Drops file in Drivers directory
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-