General
-
Target
wordup.exe
-
Size
925KB
-
Sample
240829-kyrjksshqe
-
MD5
6b3b47c27c01e8f45f6d0f6aa509315c
-
SHA1
bc6f85475afb48293370eefa2a47d04183dd1abc
-
SHA256
fe926ef4cf81095f205182c27b40b23a8b50e519b289f490b0bc75c1057f0578
-
SHA512
db982c24c9e16c63264df1a61685f77d4194a760655cd9623856b5d1a6fe1d8844e54b7c6ebae98a98bdc4d0758b19f317f3427f8eb53f0a99e0943ae3479532
-
SSDEEP
24576:WfK9zUHFpi8/OYNNJcDaF14FseUwt4P3yGX42yk:WfKtqFpiuOb2fsSf3lI2yk
Behavioral task
behavioral1
Sample
wordup.exe
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
wordup.exe
-
Size
925KB
-
MD5
6b3b47c27c01e8f45f6d0f6aa509315c
-
SHA1
bc6f85475afb48293370eefa2a47d04183dd1abc
-
SHA256
fe926ef4cf81095f205182c27b40b23a8b50e519b289f490b0bc75c1057f0578
-
SHA512
db982c24c9e16c63264df1a61685f77d4194a760655cd9623856b5d1a6fe1d8844e54b7c6ebae98a98bdc4d0758b19f317f3427f8eb53f0a99e0943ae3479532
-
SSDEEP
24576:WfK9zUHFpi8/OYNNJcDaF14FseUwt4P3yGX42yk:WfKtqFpiuOb2fsSf3lI2yk
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-