Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30/06/2024, 16:37
Static task
static1
Behavioral task
behavioral1
Sample
loder.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
loder.exe
Resource
win7-20240611-en
Behavioral task
behavioral3
Sample
loder.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
loder.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
loder.exe
Resource
win11-20240611-en
Behavioral task
behavioral6
Sample
loder.exe
Resource
macos-20240611-en
Behavioral task
behavioral7
Sample
loder.exe
Resource
macos-20240611-en
General
-
Target
loder.exe
-
Size
493KB
-
MD5
0ae466fc76575fbc2d42cdba9788be1e
-
SHA1
da2adeefdd5cd64d11dfbb0c3b46e7601cb370db
-
SHA256
3128ef59736fdcd604698ae3d5869909e54ec1b98d8759360512855174ef8927
-
SHA512
315899bda601bda320c809de1ac68a7ebb00af67f3b5a229096e71d0b451c3e5693c866e2903aca604b751c6fbc963d050afc51fb9f3e1b1df19fe5de1141378
-
SSDEEP
6144:ZbW65hV0gp63ElxKSrsqDrQCaVtvxfYkY/IgR7G7X4xuC1eTxn1:ZbaEl4Sg4aHvxfYkP267IxuCeH
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ybEePeHVnbMqQCJZqqqnT.exe loder.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ybEePeHVnbMqQCJZqqqnT.exe loder.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 3 drive.google.com