General
-
Target
d2fb65c1e1f69030da8de2d201cde600N
-
Size
542KB
-
Sample
240826-pqcsnstdmg
-
MD5
d2fb65c1e1f69030da8de2d201cde600
-
SHA1
6f8d8d35606ff58e8054eea2b2c64939d8907f96
-
SHA256
e60bd0a538b4d7f2016c5b9c2e083527f9ac7189cf9711efc1d359e573ac9a43
-
SHA512
232c6092423111bcb1b71d746677aa731ea0e45972a0fd1b0798d8da68ff6de77456d316e6892b28556d365332ffd2ae72df76ebb3766c162fdfb5374aeda3c9
-
SSDEEP
12288:f3DQLNkJyNkiJWGvGVnXpb+U2R3uo98pAOheajW:f3DQLN/NwymnXpb+UEeo9InhtjW
Behavioral task
behavioral1
Sample
d2fb65c1e1f69030da8de2d201cde600N.dll
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
d2fb65c1e1f69030da8de2d201cde600N
-
Size
542KB
-
MD5
d2fb65c1e1f69030da8de2d201cde600
-
SHA1
6f8d8d35606ff58e8054eea2b2c64939d8907f96
-
SHA256
e60bd0a538b4d7f2016c5b9c2e083527f9ac7189cf9711efc1d359e573ac9a43
-
SHA512
232c6092423111bcb1b71d746677aa731ea0e45972a0fd1b0798d8da68ff6de77456d316e6892b28556d365332ffd2ae72df76ebb3766c162fdfb5374aeda3c9
-
SSDEEP
12288:f3DQLNkJyNkiJWGvGVnXpb+U2R3uo98pAOheajW:f3DQLN/NwymnXpb+UEeo9InhtjW
-
Detect Blackmoon payload
-
Gh0st RAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-