General
-
Target
dzuier.exe.vir
-
Size
80.5MB
-
Sample
240830-wasbraxdrn
-
MD5
8907a46114778c2c5f69f82a6bf2b229
-
SHA1
38150efab6904e05b3a50f98a30f6c5a5bf1f41f
-
SHA256
89514a38c0ccd9ab17c2b06d51263e945e420eadf500dc18cdd17054900ac024
-
SHA512
53807171a75e65b5d48c5969a9e5f9604dce696339d921b46b29b1649ebad1b3ab6673af9149826add5edce61578cf5fdd8cca391d841a23c9393ad37ac00f68
-
SSDEEP
1572864:5sFmG/LCRZCLYQUux91mt46TpmSHGErH5y0oBO/rWZqyKjVnQTnPvv:5f0sQr1mt4WpmSzQBFyOvv
Static task
static1
Behavioral task
behavioral1
Sample
dzuier.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
dzuier.exe.vir
-
Size
80.5MB
-
MD5
8907a46114778c2c5f69f82a6bf2b229
-
SHA1
38150efab6904e05b3a50f98a30f6c5a5bf1f41f
-
SHA256
89514a38c0ccd9ab17c2b06d51263e945e420eadf500dc18cdd17054900ac024
-
SHA512
53807171a75e65b5d48c5969a9e5f9604dce696339d921b46b29b1649ebad1b3ab6673af9149826add5edce61578cf5fdd8cca391d841a23c9393ad37ac00f68
-
SSDEEP
1572864:5sFmG/LCRZCLYQUux91mt46TpmSHGErH5y0oBO/rWZqyKjVnQTnPvv:5f0sQr1mt4WpmSzQBFyOvv
-
Gh0st RAT payload
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-