General
-
Target
a53e46e140b8d8382fbf0f460789f992205f46556f8b2766689972250bcc8c6f
-
Size
119KB
-
Sample
240614-cmmggsvgpr
-
MD5
1dd96f2c2e74f04885d8845fbd061644
-
SHA1
f0d80c8f4756c17c2bba68c86fea4565102a3cb1
-
SHA256
a53e46e140b8d8382fbf0f460789f992205f46556f8b2766689972250bcc8c6f
-
SHA512
2f7aef7331e10617ac599a2f98038e8cac10a5ed229e0d61e52ccac4e9876bf5b926c71b179e08278d93e14b68d83f345d0206b3ca86c7ff821f6a49eedddce9
-
SSDEEP
3072:OOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPh:OIs9OKofHfHTXQLzgvnzHPowYbvrjD/E
Static task
static1
Behavioral task
behavioral1
Sample
a53e46e140b8d8382fbf0f460789f992205f46556f8b2766689972250bcc8c6f.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a53e46e140b8d8382fbf0f460789f992205f46556f8b2766689972250bcc8c6f.exe
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
a53e46e140b8d8382fbf0f460789f992205f46556f8b2766689972250bcc8c6f
-
Size
119KB
-
MD5
1dd96f2c2e74f04885d8845fbd061644
-
SHA1
f0d80c8f4756c17c2bba68c86fea4565102a3cb1
-
SHA256
a53e46e140b8d8382fbf0f460789f992205f46556f8b2766689972250bcc8c6f
-
SHA512
2f7aef7331e10617ac599a2f98038e8cac10a5ed229e0d61e52ccac4e9876bf5b926c71b179e08278d93e14b68d83f345d0206b3ca86c7ff821f6a49eedddce9
-
SSDEEP
3072:OOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPh:OIs9OKofHfHTXQLzgvnzHPowYbvrjD/E
Score9/10-
UPX dump on OEP (original entry point)
-
Drops file in Drivers directory
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-