General
-
Target
3641ef075a9694cfc4158224e5bfd7eda3202766c93a682bc6a4e559e3a3f403
-
Size
431KB
-
Sample
240908-tzpaaawcjl
-
MD5
c2545a3ac05d73eb9b8fe79a2693cdd4
-
SHA1
7d03104d0112006d94578b35e4c323632ad3ff67
-
SHA256
3641ef075a9694cfc4158224e5bfd7eda3202766c93a682bc6a4e559e3a3f403
-
SHA512
d208e06258942e9571d8730f249e878ab05ed7641207d9e69a16b3929157a9214fdf4fea1765701027bec95e54c951f6d6a8503794571e8481ea1d48086c09d5
-
SSDEEP
12288:IXi0ig1VCpPgYO+TqxeqFcOH72olHki91:IXivg1VCpZOCqxkOH7TBj
Behavioral task
behavioral1
Sample
3641ef075a9694cfc4158224e5bfd7eda3202766c93a682bc6a4e559e3a3f403.dll
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
3641ef075a9694cfc4158224e5bfd7eda3202766c93a682bc6a4e559e3a3f403
-
Size
431KB
-
MD5
c2545a3ac05d73eb9b8fe79a2693cdd4
-
SHA1
7d03104d0112006d94578b35e4c323632ad3ff67
-
SHA256
3641ef075a9694cfc4158224e5bfd7eda3202766c93a682bc6a4e559e3a3f403
-
SHA512
d208e06258942e9571d8730f249e878ab05ed7641207d9e69a16b3929157a9214fdf4fea1765701027bec95e54c951f6d6a8503794571e8481ea1d48086c09d5
-
SSDEEP
12288:IXi0ig1VCpPgYO+TqxeqFcOH72olHki91:IXivg1VCpZOCqxkOH7TBj
-
Detect Blackmoon payload
-
Gh0st RAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-