General
-
Target
a20a14118c2f06a1cc502095a1f18b3cb34ad75f1684f7ec26e24a68d4e3114c
-
Size
6.1MB
-
Sample
240810-r9zsnaycjd
-
MD5
83ebf73dd3ae56cd3f80e15220f761f3
-
SHA1
3b6a69b0c1b4ddc916323e4c3fd93f0c59736d54
-
SHA256
a20a14118c2f06a1cc502095a1f18b3cb34ad75f1684f7ec26e24a68d4e3114c
-
SHA512
0a51c195d59444bdb5caf90a95f6fbdc690c5ed8acdce830cff3836a53c145bf71582dd7fdea5fad1fe1412075e241e62aba17d7b544e61492a3d67d78ec4ea9
-
SSDEEP
98304:LP02A+gsksQuDnu0VXdK3JitsiLTAMxWtlm:/A+xDfBdK36scTAMxClm
Static task
static1
Behavioral task
behavioral1
Sample
a20a14118c2f06a1cc502095a1f18b3cb34ad75f1684f7ec26e24a68d4e3114c.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a20a14118c2f06a1cc502095a1f18b3cb34ad75f1684f7ec26e24a68d4e3114c.dll
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
a20a14118c2f06a1cc502095a1f18b3cb34ad75f1684f7ec26e24a68d4e3114c
-
Size
6.1MB
-
MD5
83ebf73dd3ae56cd3f80e15220f761f3
-
SHA1
3b6a69b0c1b4ddc916323e4c3fd93f0c59736d54
-
SHA256
a20a14118c2f06a1cc502095a1f18b3cb34ad75f1684f7ec26e24a68d4e3114c
-
SHA512
0a51c195d59444bdb5caf90a95f6fbdc690c5ed8acdce830cff3836a53c145bf71582dd7fdea5fad1fe1412075e241e62aba17d7b544e61492a3d67d78ec4ea9
-
SSDEEP
98304:LP02A+gsksQuDnu0VXdK3JitsiLTAMxWtlm:/A+xDfBdK36scTAMxClm
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-