General
-
Target
5771e6a3228332938f6b5c0cc971fe92d1f4d51d8ee6bd93eab42d9c05951621
-
Size
432KB
-
Sample
240908-xhpfha1crn
-
MD5
2dcc896fd48cb12f369cc87b11740822
-
SHA1
949bc7bfe5c14ae8857046bf881480c2b343d608
-
SHA256
5771e6a3228332938f6b5c0cc971fe92d1f4d51d8ee6bd93eab42d9c05951621
-
SHA512
30adb028abd8b753120e9073515d5dc135c9db194f158349043b5267aafed242ab7b6d3282a304d366ed8efed6e583b1f9850b19e8c33119993d3682d9791fa0
-
SSDEEP
12288:kov9YJjrV+pJR6cuXFqaYCL9yKASIAcl3hkWWlyvQX:B+JHVyR6xXky0KASbcdh6yvQX
Behavioral task
behavioral1
Sample
5771e6a3228332938f6b5c0cc971fe92d1f4d51d8ee6bd93eab42d9c05951621.dll
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
5771e6a3228332938f6b5c0cc971fe92d1f4d51d8ee6bd93eab42d9c05951621
-
Size
432KB
-
MD5
2dcc896fd48cb12f369cc87b11740822
-
SHA1
949bc7bfe5c14ae8857046bf881480c2b343d608
-
SHA256
5771e6a3228332938f6b5c0cc971fe92d1f4d51d8ee6bd93eab42d9c05951621
-
SHA512
30adb028abd8b753120e9073515d5dc135c9db194f158349043b5267aafed242ab7b6d3282a304d366ed8efed6e583b1f9850b19e8c33119993d3682d9791fa0
-
SSDEEP
12288:kov9YJjrV+pJR6cuXFqaYCL9yKASIAcl3hkWWlyvQX:B+JHVyR6xXky0KASbcdh6yvQX
-
Detect Blackmoon payload
-
Gh0st RAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-