General
-
Target
Install.exe
-
Size
162KB
-
Sample
240720-meplzsxgkn
-
MD5
1f78e6c795dd5a5f174363bb791706a2
-
SHA1
80924b5502190d916ac762425dade5e7143d7377
-
SHA256
08c51db49a008bed57f54a6370e8df0f00994acf066647c8986232bf07b3d5ec
-
SHA512
d6b1afd0489c489aad516cc83466198521cd6e9ff670d6aa76bf274f01de6b25959d495c6286718961f78517ba6d6bcd335777ecd4e8cfe33a4f04f59ab83e87
-
SSDEEP
3072:cQps/fyjjeCg4fuJaoyXekMt/q1lau7qt5a7v+kDh4tufgLgpMj:cQps/fyjjegfuR+t1kuet5GlELgpW
Static task
static1
Behavioral task
behavioral1
Sample
Install.exe
Resource
win11-20240709-en
Malware Config
Targets
-
-
Target
Install.exe
-
Size
162KB
-
MD5
1f78e6c795dd5a5f174363bb791706a2
-
SHA1
80924b5502190d916ac762425dade5e7143d7377
-
SHA256
08c51db49a008bed57f54a6370e8df0f00994acf066647c8986232bf07b3d5ec
-
SHA512
d6b1afd0489c489aad516cc83466198521cd6e9ff670d6aa76bf274f01de6b25959d495c6286718961f78517ba6d6bcd335777ecd4e8cfe33a4f04f59ab83e87
-
SSDEEP
3072:cQps/fyjjeCg4fuJaoyXekMt/q1lau7qt5a7v+kDh4tufgLgpMj:cQps/fyjjegfuR+t1kuet5GlELgpW
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-