General
-
Target
06f93f00bd3f90ed91a848bd08ad525ea621ee5c150431f6b461ff84bb48fdea
-
Size
432KB
-
Sample
240828-jk1pnazepd
-
MD5
e6673827ea00940ae1d2f652ed82bb00
-
SHA1
1ecf7114d04c17e17e623b23fcace770c1c524b9
-
SHA256
06f93f00bd3f90ed91a848bd08ad525ea621ee5c150431f6b461ff84bb48fdea
-
SHA512
0e50dc798e3afb55665b6aadde6a281cbb0c08505bc12dccccee2b7aa765abd77181ad7047f19192777e8e91b8743933b732c7bdfefb01d9a4ead5aee64babd9
-
SSDEEP
12288:kov9YJjrV+pJR6cuXFqaYCL9yKASIAcl3hkWWlyvQ3:B+JHVyR6xXky0KASbcdh6yvQ3
Behavioral task
behavioral1
Sample
06f93f00bd3f90ed91a848bd08ad525ea621ee5c150431f6b461ff84bb48fdea.dll
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
06f93f00bd3f90ed91a848bd08ad525ea621ee5c150431f6b461ff84bb48fdea
-
Size
432KB
-
MD5
e6673827ea00940ae1d2f652ed82bb00
-
SHA1
1ecf7114d04c17e17e623b23fcace770c1c524b9
-
SHA256
06f93f00bd3f90ed91a848bd08ad525ea621ee5c150431f6b461ff84bb48fdea
-
SHA512
0e50dc798e3afb55665b6aadde6a281cbb0c08505bc12dccccee2b7aa765abd77181ad7047f19192777e8e91b8743933b732c7bdfefb01d9a4ead5aee64babd9
-
SSDEEP
12288:kov9YJjrV+pJR6cuXFqaYCL9yKASIAcl3hkWWlyvQ3:B+JHVyR6xXky0KASbcdh6yvQ3
-
Detect Blackmoon payload
-
Gh0st RAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-