General
-
Target
043c4e6269de5f64aa07e6e070d641a7359580601618c95c3e882189fd2a1dea
-
Size
432KB
-
Sample
240908-w8wrts1ank
-
MD5
16280faa247da36f787fe43d2ddde93a
-
SHA1
255a873bc9f358aad4e2ce32338a101ad33ddd59
-
SHA256
043c4e6269de5f64aa07e6e070d641a7359580601618c95c3e882189fd2a1dea
-
SHA512
f789e1701f7152c7a006037fdc4a2ad5e76d3126d301129909aca2ab47919026ff2700fa8294636e000b9e0c43805b667a9adfe7815c5946cfa7f8a895c5701a
-
SSDEEP
12288:kov9YJjrV+pJR6cuXFqaYCL9yKASIAcl3hkWWlyvQ5:B+JHVyR6xXky0KASbcdh6yvQ5
Behavioral task
behavioral1
Sample
043c4e6269de5f64aa07e6e070d641a7359580601618c95c3e882189fd2a1dea.dll
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
043c4e6269de5f64aa07e6e070d641a7359580601618c95c3e882189fd2a1dea
-
Size
432KB
-
MD5
16280faa247da36f787fe43d2ddde93a
-
SHA1
255a873bc9f358aad4e2ce32338a101ad33ddd59
-
SHA256
043c4e6269de5f64aa07e6e070d641a7359580601618c95c3e882189fd2a1dea
-
SHA512
f789e1701f7152c7a006037fdc4a2ad5e76d3126d301129909aca2ab47919026ff2700fa8294636e000b9e0c43805b667a9adfe7815c5946cfa7f8a895c5701a
-
SSDEEP
12288:kov9YJjrV+pJR6cuXFqaYCL9yKASIAcl3hkWWlyvQ5:B+JHVyR6xXky0KASbcdh6yvQ5
-
Detect Blackmoon payload
-
Gh0st RAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-