General
-
Target
IMG_342_online-video-cutter.com_1.mp4
-
Size
1.2MB
-
Sample
240624-xttjla1erq
-
MD5
ecefb5d20e8487156191ff586bc1f3e4
-
SHA1
edf16117a22fcb3e9140667b08f5cc00b8a983b0
-
SHA256
81f27467fe8d443c2cf2c9719e469414740c8f59382d1301773e427c8a214c86
-
SHA512
237037fcb543aa660346d3fcc9e3a707a408009efdeb7fcc36bf4617200a2a77fcc4499d7a5b27baea12da6734c2a63522cc17943ebb420d4d09c3e9e21335a3
-
SSDEEP
24576:1Ok80xWUZI2Ss8rvXDo4S37kpSBlsPUqZ93jpz1Hre8EGqPxKJIO/:1b8evuvXDoj2Ss5N1HrhEGqPEJt/
Static task
static1
Behavioral task
behavioral1
Sample
IMG_342_online-video-cutter.com_1.mp4
Resource
win10v2004-20240508-fr
Malware Config
Targets
-
-
Target
IMG_342_online-video-cutter.com_1.mp4
-
Size
1.2MB
-
MD5
ecefb5d20e8487156191ff586bc1f3e4
-
SHA1
edf16117a22fcb3e9140667b08f5cc00b8a983b0
-
SHA256
81f27467fe8d443c2cf2c9719e469414740c8f59382d1301773e427c8a214c86
-
SHA512
237037fcb543aa660346d3fcc9e3a707a408009efdeb7fcc36bf4617200a2a77fcc4499d7a5b27baea12da6734c2a63522cc17943ebb420d4d09c3e9e21335a3
-
SSDEEP
24576:1Ok80xWUZI2Ss8rvXDo4S37kpSBlsPUqZ93jpz1Hre8EGqPxKJIO/:1b8evuvXDoj2Ss5N1HrhEGqPEJt/
Score8/10-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-