General
-
Target
691aa82b91b626470e41232c3e207170N.exe
-
Size
13KB
-
Sample
240823-xydnya1gld
-
MD5
691aa82b91b626470e41232c3e207170
-
SHA1
78cb61340318a2e38e349ae721a7da0d4365e99b
-
SHA256
f7ad9a4635683d038f53164feea9d3cf1cf8c59632c91f7b2dcfe329c0b47789
-
SHA512
4e71fa835c4408c6b78435f030794ab72e05c736eac1d48cf6eb3f7f98aefa48e98f4504e43d906b0905fdb53364b37de5ba81bbf53afe659c9ba8e2ae1706bb
-
SSDEEP
384:YLOTSoMaHAhzQYVu1TY7gKJEmizmzCaF1FY:5Sagh0Qu1UkKE7AF
Static task
static1
Behavioral task
behavioral1
Sample
691aa82b91b626470e41232c3e207170N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
691aa82b91b626470e41232c3e207170N.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
691aa82b91b626470e41232c3e207170N.exe
-
Size
13KB
-
MD5
691aa82b91b626470e41232c3e207170
-
SHA1
78cb61340318a2e38e349ae721a7da0d4365e99b
-
SHA256
f7ad9a4635683d038f53164feea9d3cf1cf8c59632c91f7b2dcfe329c0b47789
-
SHA512
4e71fa835c4408c6b78435f030794ab72e05c736eac1d48cf6eb3f7f98aefa48e98f4504e43d906b0905fdb53364b37de5ba81bbf53afe659c9ba8e2ae1706bb
-
SSDEEP
384:YLOTSoMaHAhzQYVu1TY7gKJEmizmzCaF1FY:5Sagh0Qu1UkKE7AF
Score10/10-
Detects Andromeda payload.
-
Adds policy Run key to start application
-
Deletes itself
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-