General
-
Target
External Email secure' ANS-- RQM-151393 INC - W ID suspended.msg
-
Size
182KB
-
Sample
240909-x6yzvaxfqa
-
MD5
9a9028d61ce792545d58104284fec3ea
-
SHA1
02f747620a9252fa4a7f5806e76ebd6464610d30
-
SHA256
92d52f19422a72074e143ba1c426e81e684d5530aec205086ebecb05f7f32e62
-
SHA512
2c0fdef9d49ebee65bd7f1d8472960567461694c6b7e65f6d91053f822564f1c67c2d64cb4d1966f9fe2fdc6223ba2aa24f4de1556aef8ed0c794b21192852a8
-
SSDEEP
3072:M1fXT1mdhtQwhXHULAmgeHaPTqRmjBmeLAMiX1tN:WfXT1mTZhXHxDB+X1
Static task
static1
Behavioral task
behavioral1
Sample
External Email secure' ANS-- RQM-151393 INC - W ID suspended.msg
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
message_v2.rpmsg
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
External Email secure' ANS-- RQM-151393 INC - W ID suspended.msg
-
Size
182KB
-
MD5
9a9028d61ce792545d58104284fec3ea
-
SHA1
02f747620a9252fa4a7f5806e76ebd6464610d30
-
SHA256
92d52f19422a72074e143ba1c426e81e684d5530aec205086ebecb05f7f32e62
-
SHA512
2c0fdef9d49ebee65bd7f1d8472960567461694c6b7e65f6d91053f822564f1c67c2d64cb4d1966f9fe2fdc6223ba2aa24f4de1556aef8ed0c794b21192852a8
-
SSDEEP
3072:M1fXT1mdhtQwhXHULAmgeHaPTqRmjBmeLAMiX1tN:WfXT1mTZhXHxDB+X1
Score3/10 -
-
-
Target
message_v2.rpmsg
-
Size
46KB
-
MD5
c1f7780d02951474c76efecc0811abe1
-
SHA1
97dc6a29305ebf4361e14c4de0d067569d174325
-
SHA256
beba6d5315b1a4a21d9a58eac46ae5be402e6c10193313ac4c00366ffefe5a34
-
SHA512
d0a30813983cdecc8e9acf8142c6151e7882e329dccc9cf75c1ac729cb58a6f953e14da198ab35dd89296cf5f221c3612d8c62fd7fdd13946f73fffe8f6e9bb7
-
SSDEEP
768:HyfRvLOtFpmtqa9WEUwqfHKlxt759YkGgLEN8HLxeeIG21927iU521tNNTXhd:SZqtFpmtWw42X759BGWEyHLxeeZpiO2r
Score6/10-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-