General
-
Target
c92b96874801297b26cc527b3187ea10N.exe
-
Size
431KB
-
Sample
240817-bpvefayerc
-
MD5
c92b96874801297b26cc527b3187ea10
-
SHA1
4fbbafc3a8f4cbc443eef2236f22ca9a12f6f826
-
SHA256
1166cac6949c09a980f8adad357bbdb788661c6967e2d73949f8f06d0ceb40ab
-
SHA512
482a6e0b4609d2a42366464a7d13d067deeac74bd2b86ce2921a9f173a0f8a460b3b495cc98385783e874294c25ffcd62e11669d948d71226094e4edbbc4d9ca
-
SSDEEP
12288:IXi0ig1VCpPgYO+TqxeqFcOH72olHki9+:IXivg1VCpZOCqxkOH7TBo
Behavioral task
behavioral1
Sample
c92b96874801297b26cc527b3187ea10N.dll
Resource
win7-20240705-en
Malware Config
Targets
-
-
Target
c92b96874801297b26cc527b3187ea10N.exe
-
Size
431KB
-
MD5
c92b96874801297b26cc527b3187ea10
-
SHA1
4fbbafc3a8f4cbc443eef2236f22ca9a12f6f826
-
SHA256
1166cac6949c09a980f8adad357bbdb788661c6967e2d73949f8f06d0ceb40ab
-
SHA512
482a6e0b4609d2a42366464a7d13d067deeac74bd2b86ce2921a9f173a0f8a460b3b495cc98385783e874294c25ffcd62e11669d948d71226094e4edbbc4d9ca
-
SSDEEP
12288:IXi0ig1VCpPgYO+TqxeqFcOH72olHki9+:IXivg1VCpZOCqxkOH7TBo
-
Detect Blackmoon payload
-
Gh0st RAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-