General
-
Target
Bloxy.exe
-
Size
16.1MB
-
Sample
240619-1gd5xsxcmk
-
MD5
c14536a24e72360f88d7afaa951d066b
-
SHA1
36c134ecf1212514f892c779e078bea559e766a4
-
SHA256
36d8ecf4cd3f5ea1e77880fe0dfee7bd9155b77fec00b81c84f36876abf8e542
-
SHA512
c005f8f0a728b93168010b91afaa6e291a74fae26edd2089d541bdc3b14abc7b8139dbece576e538488daf417d1d4953064e2975fee227162ce81b9d0a9f092f
-
SSDEEP
393216:Ymc4gP8AxYDX1+TtIiFGMiP1gZY9Z8D8CclI0EJ0os:Y34bX71QtIWiP2a8DZcbR
Behavioral task
behavioral1
Sample
Bloxy.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
Bloxy.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
Bloxy.exe
-
Size
16.1MB
-
MD5
c14536a24e72360f88d7afaa951d066b
-
SHA1
36c134ecf1212514f892c779e078bea559e766a4
-
SHA256
36d8ecf4cd3f5ea1e77880fe0dfee7bd9155b77fec00b81c84f36876abf8e542
-
SHA512
c005f8f0a728b93168010b91afaa6e291a74fae26edd2089d541bdc3b14abc7b8139dbece576e538488daf417d1d4953064e2975fee227162ce81b9d0a9f092f
-
SSDEEP
393216:Ymc4gP8AxYDX1+TtIiFGMiP1gZY9Z8D8CclI0EJ0os:Y34bX71QtIWiP2a8DZcbR
Score8/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to get system information as a root user.
-
Loads dropped DLL
-