General
-
Target
b5415377e1dde79cab735bc1b6f67dba514c24355563dcd7c95357cb3b2fff80
-
Size
432KB
-
Sample
240908-zqq1eaxdnh
-
MD5
91ef0887d053aca8b5628795eeeb54fa
-
SHA1
59891b82e8ca3f2218dd9b4a6308396471a593dc
-
SHA256
b5415377e1dde79cab735bc1b6f67dba514c24355563dcd7c95357cb3b2fff80
-
SHA512
74f202f25fb7ee0347eb2dd226ca4dae05d000fa43b7f8a7d83dcddd243553756aa87493efd929c689f77825e4c2fe3e0bf852ba85f0b86b77ec48b3f8c892b0
-
SSDEEP
12288:kov9YJjrV+pJR6cuXFqaYCL9yKASIAcl3hkWWlyvQl:B+JHVyR6xXky0KASbcdh6yvQl
Behavioral task
behavioral1
Sample
b5415377e1dde79cab735bc1b6f67dba514c24355563dcd7c95357cb3b2fff80.dll
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
b5415377e1dde79cab735bc1b6f67dba514c24355563dcd7c95357cb3b2fff80
-
Size
432KB
-
MD5
91ef0887d053aca8b5628795eeeb54fa
-
SHA1
59891b82e8ca3f2218dd9b4a6308396471a593dc
-
SHA256
b5415377e1dde79cab735bc1b6f67dba514c24355563dcd7c95357cb3b2fff80
-
SHA512
74f202f25fb7ee0347eb2dd226ca4dae05d000fa43b7f8a7d83dcddd243553756aa87493efd929c689f77825e4c2fe3e0bf852ba85f0b86b77ec48b3f8c892b0
-
SSDEEP
12288:kov9YJjrV+pJR6cuXFqaYCL9yKASIAcl3hkWWlyvQl:B+JHVyR6xXky0KASbcdh6yvQl
-
Detect Blackmoon payload
-
Gh0st RAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-