General
-
Target
b7f567c194bd8f1732502ed43eb6e06ae97cdad65778f7fb34ba1c74c26aedf2
-
Size
431KB
-
Sample
240908-lv39ms1gmf
-
MD5
d37c84a801e443b067c8b7f41c072361
-
SHA1
00829d8a58c40dfd05e817adf2fee57f7d468806
-
SHA256
b7f567c194bd8f1732502ed43eb6e06ae97cdad65778f7fb34ba1c74c26aedf2
-
SHA512
ac16ce66b86361fc6ce1a757a2229e42ef688f354684cf324401a908ce009c6cc00c9758c4a1cfd885d1716b2c0d8cd66dad28766c2d79a5925c7979baf3f1b7
-
SSDEEP
12288:IXi0ig1VCpPgYO+TqxeqFcOH72olHki9y:IXivg1VCpZOCqxkOH7TBk
Behavioral task
behavioral1
Sample
b7f567c194bd8f1732502ed43eb6e06ae97cdad65778f7fb34ba1c74c26aedf2.dll
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
b7f567c194bd8f1732502ed43eb6e06ae97cdad65778f7fb34ba1c74c26aedf2
-
Size
431KB
-
MD5
d37c84a801e443b067c8b7f41c072361
-
SHA1
00829d8a58c40dfd05e817adf2fee57f7d468806
-
SHA256
b7f567c194bd8f1732502ed43eb6e06ae97cdad65778f7fb34ba1c74c26aedf2
-
SHA512
ac16ce66b86361fc6ce1a757a2229e42ef688f354684cf324401a908ce009c6cc00c9758c4a1cfd885d1716b2c0d8cd66dad28766c2d79a5925c7979baf3f1b7
-
SSDEEP
12288:IXi0ig1VCpPgYO+TqxeqFcOH72olHki9y:IXivg1VCpZOCqxkOH7TBk
-
Detect Blackmoon payload
-
Gh0st RAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-