General
-
Target
6a5d136bbf908e8cf7e098a0914ca8376ff9f03e4a1488856cc4d250d2cb8c66
-
Size
1.1MB
-
Sample
240624-a23qxavbkm
-
MD5
ea50db1b45a9305ec2daafdcd2f567ff
-
SHA1
13fe1aa6e37d5de3d6f8473b3016a45af8fc70b7
-
SHA256
6a5d136bbf908e8cf7e098a0914ca8376ff9f03e4a1488856cc4d250d2cb8c66
-
SHA512
1c9e63d9c5f7216c10157d7305dad8254f8cb8dc4443e4acb98901970cf9d0c8a08d4040a5c6ab407a826ec030e6324b2392c9be427d1fcaff137d9eb132c70e
-
SSDEEP
24576:k2/JIvJYCjH0SicpmgGmAh1tYd7pRkeM9:kwJIvJDH0pJtopK
Static task
static1
Behavioral task
behavioral1
Sample
6a5d136bbf908e8cf7e098a0914ca8376ff9f03e4a1488856cc4d250d2cb8c66.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
6a5d136bbf908e8cf7e098a0914ca8376ff9f03e4a1488856cc4d250d2cb8c66.dll
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
6a5d136bbf908e8cf7e098a0914ca8376ff9f03e4a1488856cc4d250d2cb8c66
-
Size
1.1MB
-
MD5
ea50db1b45a9305ec2daafdcd2f567ff
-
SHA1
13fe1aa6e37d5de3d6f8473b3016a45af8fc70b7
-
SHA256
6a5d136bbf908e8cf7e098a0914ca8376ff9f03e4a1488856cc4d250d2cb8c66
-
SHA512
1c9e63d9c5f7216c10157d7305dad8254f8cb8dc4443e4acb98901970cf9d0c8a08d4040a5c6ab407a826ec030e6324b2392c9be427d1fcaff137d9eb132c70e
-
SSDEEP
24576:k2/JIvJYCjH0SicpmgGmAh1tYd7pRkeM9:kwJIvJDH0pJtopK
Score7/10-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-