General
-
Target
PCToaster.zip
-
Size
62KB
-
Sample
240622-e3c9vsxhmg
-
MD5
eb537eed40cf1eca96e2bf352df65089
-
SHA1
ca71aa23b227b816b017e267203fa3319b59d8fc
-
SHA256
839e2e8904c5d91ab82e848a0f5ee93de32cf1d8539a9be8676d77c948e8ad14
-
SHA512
95dca4c07c6cccbbaae47c6b1ed5083375f9b9037555efff8db8f3ac69388b4ffd9c9652e2f5db498532b4b3ceee160f190be31a85b242ba476d89580963f487
-
SSDEEP
1536:6uhyUJLCbXUS3bS8FJA5KP/aCUnYzulKP5Ud7bAh:TZJLCbXUSrS8Q0PY+ulWn
Static task
static1
Malware Config
Targets
-
-
Target
PCToaster.exe
-
Size
411KB
-
MD5
04251a49a240dbf60975ac262fc6aeb7
-
SHA1
e211ca63af2ab85ffab1e5fbbdf28a4ef8f77de0
-
SHA256
85a58aa96dccd94316a34608ba996656a22c8158d5156b6e454d9d69e6ff38c3
-
SHA512
3422a231e1dadb68d3567a99d46791392ecf5883fd3bbc2cae19a595364dac46e4b2712db70b61b488937d906413d39411554034ffd3058389700a93c17568d2
-
SSDEEP
3072:quJFS5Aqu+WwjxeI/0gVnfKl0FA+aPobO24yNz88iu8vDYHTlI5EJD5Hbibfd6PK:/JM0mCsWq1/qpz+nF5c
-
Possible privilege escalation attempt
-
Modifies file permissions
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-