General
-
Target
9f8ba4e70e2b70d9508941392ab9b330d489f3aadd20fe4b06849c4d169628ef
-
Size
432KB
-
Sample
240908-e2qtkaweqp
-
MD5
19287f6438e2da58aed6c5d3ab322d18
-
SHA1
165529aff8f97b55ec1f5d411bac38f8d0f5ae6d
-
SHA256
9f8ba4e70e2b70d9508941392ab9b330d489f3aadd20fe4b06849c4d169628ef
-
SHA512
97ab6b01764f2339f01d6de5a29014c76a35d9a4b9d3c1a94aa7431aaf9fea3b83458349223961759a0f1b2e33bc5102d712c0ca6098ecbedc5979a5ff502dcf
-
SSDEEP
12288:kov9YJjrV+pJR6cuXFqaYCL9yKASIAcl3hkWWlyvQV:B+JHVyR6xXky0KASbcdh6yvQV
Behavioral task
behavioral1
Sample
9f8ba4e70e2b70d9508941392ab9b330d489f3aadd20fe4b06849c4d169628ef.dll
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
9f8ba4e70e2b70d9508941392ab9b330d489f3aadd20fe4b06849c4d169628ef
-
Size
432KB
-
MD5
19287f6438e2da58aed6c5d3ab322d18
-
SHA1
165529aff8f97b55ec1f5d411bac38f8d0f5ae6d
-
SHA256
9f8ba4e70e2b70d9508941392ab9b330d489f3aadd20fe4b06849c4d169628ef
-
SHA512
97ab6b01764f2339f01d6de5a29014c76a35d9a4b9d3c1a94aa7431aaf9fea3b83458349223961759a0f1b2e33bc5102d712c0ca6098ecbedc5979a5ff502dcf
-
SSDEEP
12288:kov9YJjrV+pJR6cuXFqaYCL9yKASIAcl3hkWWlyvQV:B+JHVyR6xXky0KASbcdh6yvQV
-
Detect Blackmoon payload
-
Gh0st RAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-