General
-
Target
54bf334fd867ee19dd314ab1e09c083de27a9f0540d6b1a9ac1600e747f8c87d
-
Size
432KB
-
Sample
240913-1z2zpssclh
-
MD5
e81bbfa0c23086d9e58bae0ac76ce29a
-
SHA1
3411e17f95625d951536a6ddd7c0cee885db2fdd
-
SHA256
54bf334fd867ee19dd314ab1e09c083de27a9f0540d6b1a9ac1600e747f8c87d
-
SHA512
d22a373b988d9f99aaef07b223d480f11c3cea8ab9c3e15e4f60f371191edf2fe66638b9a52da9bf8b1320d997b6b19631502e907e5cee74612c77cf861b748f
-
SSDEEP
12288:kov9YJjrV+pJR6cuXFqaYCL9yKASIAcl3hkWWlyvQ+:B+JHVyR6xXky0KASbcdh6yvQ+
Behavioral task
behavioral1
Sample
54bf334fd867ee19dd314ab1e09c083de27a9f0540d6b1a9ac1600e747f8c87d.dll
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
54bf334fd867ee19dd314ab1e09c083de27a9f0540d6b1a9ac1600e747f8c87d
-
Size
432KB
-
MD5
e81bbfa0c23086d9e58bae0ac76ce29a
-
SHA1
3411e17f95625d951536a6ddd7c0cee885db2fdd
-
SHA256
54bf334fd867ee19dd314ab1e09c083de27a9f0540d6b1a9ac1600e747f8c87d
-
SHA512
d22a373b988d9f99aaef07b223d480f11c3cea8ab9c3e15e4f60f371191edf2fe66638b9a52da9bf8b1320d997b6b19631502e907e5cee74612c77cf861b748f
-
SSDEEP
12288:kov9YJjrV+pJR6cuXFqaYCL9yKASIAcl3hkWWlyvQ+:B+JHVyR6xXky0KASbcdh6yvQ+
-
Detect Blackmoon payload
-
Gh0st RAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-