General
-
Target
temp_data.rar
-
Size
17.4MB
-
Sample
240824-t5dqqs1cqp
-
MD5
d7921f94494dd9213390699535de3e6f
-
SHA1
c7e5e8dfdcbe71acbdf5996759f49ce0e42f80a3
-
SHA256
5f9ab323ea63d90774804713dd2f85907ce99c0a8cbab40d52c3cb0dc431c201
-
SHA512
4eb70518d7e78611167737c0939b114236cb193f2e0c32dff71f839f544f8708e5440cae5866c4dc8c908d90ab1f8bb6159e7ed766d5c17eef903bfaf0266906
-
SSDEEP
393216:FPTaL6zRHjS7yiw2ahMqycz1oUwYqyMSM0wz46WRthcSRUbQs:FPG2FjS7bw2lqyc5jEyMSM0wUFRDtgv
Behavioral task
behavioral1
Sample
2555superiority.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2555superiority.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
eacbypass.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
eacbypass.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
2555superiority.dll
-
Size
2.9MB
-
MD5
88e03e21ef24b687e09ff9b99edb1ed8
-
SHA1
3157b62c5d2e23735fde4ed59748bd549b498e18
-
SHA256
856265d0d04d67dce09d0046806d41b11dd74ab5336d359ed6fbccb7bfd72e5c
-
SHA512
e12356886ff19e6cb01287f10f3e2154a6ba05ba566de02eb62d803c417c1b344abb37e05f0a3fc2b2f7602c49a4456abb6014f716b5018d1a863f61f5fdc460
-
SSDEEP
49152:EKXLDMhW01Um5dUUm80QbaqLxF9guV4nQ5ERj9mlWeiYtnERyuiCk:rXq2D4F9k9e/
Score5/10-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
eacbypass.exe
-
Size
17.0MB
-
MD5
b0b621a3e61a8e3f86368425ab6c6d17
-
SHA1
ceb3762cb1ada2f2cec48ad73c0b7d27ce1bc863
-
SHA256
48526989c4dc457e5efb621c882893f4dfb770b7c6c2516ffa85d2abb43a1d66
-
SHA512
93c6331a4119f484fab790d1cf29822ab05d2889771eff921029aa8dbf67518b7450969fae6b25daca6b6e3368a159b89d68cc245653a703b25fa0b4323ec43a
-
SSDEEP
393216:Ezl82HAcXwF0L1+TtIiFg0VmRW8E5u6bGpV3g5bLYj5fF:sjDwF0L1QtI6mRW8IuxV3Mg3
Score7/10-
Loads dropped DLL
-