General
-
Target
6eaccbf0dd19090919338e8d72d5e2f3e0bcf8a9ab26d48db585e1e9d1d06cde
-
Size
432KB
-
Sample
240908-xtxw1stfme
-
MD5
20d17a804accc59d421c3b4ea39d8525
-
SHA1
500fd8508a2d81faac63645d65b68cc61dbd49e1
-
SHA256
6eaccbf0dd19090919338e8d72d5e2f3e0bcf8a9ab26d48db585e1e9d1d06cde
-
SHA512
c8a075802becc9a1a0f5012203f29dc67e63b42d7b4e654aefed0688b6ffeb3a6a5dca175a43980f4355d15f149e1dae64d4308439df7752f66f5fc59e567a25
-
SSDEEP
12288:kov9YJjrV+pJR6cuXFqaYCL9yKASIAcl3hkWWlyvQw:B+JHVyR6xXky0KASbcdh6yvQw
Behavioral task
behavioral1
Sample
6eaccbf0dd19090919338e8d72d5e2f3e0bcf8a9ab26d48db585e1e9d1d06cde.dll
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
6eaccbf0dd19090919338e8d72d5e2f3e0bcf8a9ab26d48db585e1e9d1d06cde
-
Size
432KB
-
MD5
20d17a804accc59d421c3b4ea39d8525
-
SHA1
500fd8508a2d81faac63645d65b68cc61dbd49e1
-
SHA256
6eaccbf0dd19090919338e8d72d5e2f3e0bcf8a9ab26d48db585e1e9d1d06cde
-
SHA512
c8a075802becc9a1a0f5012203f29dc67e63b42d7b4e654aefed0688b6ffeb3a6a5dca175a43980f4355d15f149e1dae64d4308439df7752f66f5fc59e567a25
-
SSDEEP
12288:kov9YJjrV+pJR6cuXFqaYCL9yKASIAcl3hkWWlyvQw:B+JHVyR6xXky0KASbcdh6yvQw
-
Detect Blackmoon payload
-
Gh0st RAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-