General
-
Target
043ba3fdc65acdba8ca4d2af047465a1617d4591a9f771d5e4d629ab74736599
-
Size
431KB
-
Sample
240908-klts6sydrf
-
MD5
5d5d2c946b00fff3240c84c2061694d9
-
SHA1
a571aafaf56d7ade0fb02a05cde1008815046793
-
SHA256
043ba3fdc65acdba8ca4d2af047465a1617d4591a9f771d5e4d629ab74736599
-
SHA512
725832b0071e8f8a19029d2b5d8790484ca475c12634d307e6f5c9d0f199102d9943da62f8825600ebc932b5fb91ba752fadc7453e400103901f35aae11b1aed
-
SSDEEP
12288:IXi0ig1VCpPgYO+TqxeqFcOH72olHki9Q:IXivg1VCpZOCqxkOH7TBG
Behavioral task
behavioral1
Sample
043ba3fdc65acdba8ca4d2af047465a1617d4591a9f771d5e4d629ab74736599.dll
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
043ba3fdc65acdba8ca4d2af047465a1617d4591a9f771d5e4d629ab74736599
-
Size
431KB
-
MD5
5d5d2c946b00fff3240c84c2061694d9
-
SHA1
a571aafaf56d7ade0fb02a05cde1008815046793
-
SHA256
043ba3fdc65acdba8ca4d2af047465a1617d4591a9f771d5e4d629ab74736599
-
SHA512
725832b0071e8f8a19029d2b5d8790484ca475c12634d307e6f5c9d0f199102d9943da62f8825600ebc932b5fb91ba752fadc7453e400103901f35aae11b1aed
-
SSDEEP
12288:IXi0ig1VCpPgYO+TqxeqFcOH72olHki9Q:IXivg1VCpZOCqxkOH7TBG
-
Detect Blackmoon payload
-
Gh0st RAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-