General
-
Target
Server.exe
-
Size
1.8MB
-
Sample
240804-qkmalawdjm
-
MD5
8eabcefd2de8de4165d584a9e5e97442
-
SHA1
938a8218cba785ac55e521218d0a09dfe8a4d0e9
-
SHA256
fd2511e8d9494103d9b11298bee748449392fc742e2952152142840701080427
-
SHA512
c6607bae21c061ad38292bd7b2810d3cab6d4f1487383b52caf5fcaa5d41e177586ec22cbaff2fef857e44ba827294a5a7e0062556065058b43f966de7dc91e7
-
SSDEEP
49152:l9ItXMQYmomSkmmtEQQQUmemmmmmmIzmeywwq07uDrWd:l9ItUmomSkmmtEQQQUmemmmmmmIzmeyJ
Behavioral task
behavioral1
Sample
Server.exe
Resource
win10v2004-20240802-uk
Malware Config
Targets
-
-
Target
Server.exe
-
Size
1.8MB
-
MD5
8eabcefd2de8de4165d584a9e5e97442
-
SHA1
938a8218cba785ac55e521218d0a09dfe8a4d0e9
-
SHA256
fd2511e8d9494103d9b11298bee748449392fc742e2952152142840701080427
-
SHA512
c6607bae21c061ad38292bd7b2810d3cab6d4f1487383b52caf5fcaa5d41e177586ec22cbaff2fef857e44ba827294a5a7e0062556065058b43f966de7dc91e7
-
SSDEEP
49152:l9ItXMQYmomSkmmtEQQQUmemmmmmmIzmeywwq07uDrWd:l9ItUmomSkmmtEQQQUmemmmmmmIzmeyJ
Score8/10-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-