General
-
Target
engineer-taunt.gif
-
Size
279KB
-
Sample
240620-2v8gcsvhrq
-
MD5
8a9e3be06ec8496c7f1a4233876b0697
-
SHA1
1d29ad9068d227f89009d610d91cca502591bf46
-
SHA256
f19abff1a72b1ef08d57541a0d21908b7bf3ae6797d1bcf08c6a81a7c312393f
-
SHA512
f2af39fc536b6b56a485653bfa5b07ea3d3d4a892a1f410c62d13ade46881f321ff79cbfdbf2cfb2a4e82502c24d74ca1ec4bf310d714bdf70c8ddd3ab93ad9b
-
SSDEEP
6144:4pI6FKD9iEziUIicrzC4CAXJHUqMM4XiU7XQzY0yWjvYM+:4p1oiYozMAWq14SU7gzRjvP+
Static task
static1
Behavioral task
behavioral1
Sample
engineer-taunt.gif
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
engineer-taunt.gif
Resource
win7-20240611-en
Malware Config
Targets
-
-
Target
engineer-taunt.gif
-
Size
279KB
-
MD5
8a9e3be06ec8496c7f1a4233876b0697
-
SHA1
1d29ad9068d227f89009d610d91cca502591bf46
-
SHA256
f19abff1a72b1ef08d57541a0d21908b7bf3ae6797d1bcf08c6a81a7c312393f
-
SHA512
f2af39fc536b6b56a485653bfa5b07ea3d3d4a892a1f410c62d13ade46881f321ff79cbfdbf2cfb2a4e82502c24d74ca1ec4bf310d714bdf70c8ddd3ab93ad9b
-
SSDEEP
6144:4pI6FKD9iEziUIicrzC4CAXJHUqMM4XiU7XQzY0yWjvYM+:4p1oiYozMAWq14SU7gzRjvP+
-
Possible privilege escalation attempt
-
Modifies file permissions
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-