General
-
Target
k7wasvUmhVhzw1tr.mp4
-
Size
290KB
-
Sample
240912-wckppawdne
-
MD5
2f56fc6fc90f33ae6467b7c008e4b602
-
SHA1
bf1c58280768c6cc6e66f4c0b8a621698694b2cf
-
SHA256
ac7bedf7efe27c0827fbe122e4f92bf272df550ae3dea356a241c39bd07cc2be
-
SHA512
1955476f41be0aed7db4c0740dd3fb778f62518f27f9f52afc481f83e88d060feb2686597fd06adaaf8e0a2135c55de0e577134fc92d725301b2378e19e40c73
-
SSDEEP
6144:jrq9ntBflBz+OpZPRTGdbh2uH21e48NVK9ZWPjFPbJqAS:XUPtpB5Cdt2uH2UxzK9YPjHqAS
Static task
static1
Malware Config
Targets
-
-
Target
k7wasvUmhVhzw1tr.mp4
-
Size
290KB
-
MD5
2f56fc6fc90f33ae6467b7c008e4b602
-
SHA1
bf1c58280768c6cc6e66f4c0b8a621698694b2cf
-
SHA256
ac7bedf7efe27c0827fbe122e4f92bf272df550ae3dea356a241c39bd07cc2be
-
SHA512
1955476f41be0aed7db4c0740dd3fb778f62518f27f9f52afc481f83e88d060feb2686597fd06adaaf8e0a2135c55de0e577134fc92d725301b2378e19e40c73
-
SSDEEP
6144:jrq9ntBflBz+OpZPRTGdbh2uH21e48NVK9ZWPjFPbJqAS:XUPtpB5Cdt2uH2UxzK9YPjHqAS
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-