General
-
Target
ruffle-nightly-2024_09_19-windows-x86_64.zip
-
Size
19.2MB
-
Sample
240919-m9g6dsvflf
-
MD5
e3af8abc7babba6d53f3566b4f333538
-
SHA1
d85625c271ff5a2244de90538ed9cd4c46a01add
-
SHA256
64f78d4d0048a18742efd4d8d626b071b50e6b5487ef9553d5f955793630ca82
-
SHA512
6041a761a0fac815ad2910a23c2f8cdca97c60dc093bc90cff03b2e3915a606895e53a82fb4dc0d17557c71114e6681a49be8a254cb151c1a8fa83fec8bd2e15
-
SSDEEP
393216:hheCHJaC8cpWRxKTuPP/0m5Qy1LdfsbnAH4MKhAQYuP:fedC0RkTsPMmx1RfsbAHJKKUP
Static task
static1
Behavioral task
behavioral1
Sample
ruffle.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ruffle.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
setup.msi
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
setup.msi
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
ruffle.exe
-
Size
25.4MB
-
MD5
a13d4c44b37b5b8581d711913e60dda0
-
SHA1
dd156b114ef90a6339e9e56514053f3f5b01ef58
-
SHA256
0be0280db3d2fc970d7ff5bf738323bec83779ed9b14ef0559b6b27ad83055c2
-
SHA512
185180c3cc81c051b46e318ccc0c764d55418a68ed471b00f0042115c39a20ec43b5b9d28aa6cdf5630f8c5e3196e7fb7fa4c6578a5aefa694324ce5b7f73abc
-
SSDEEP
196608:KnAfJ38sNwW4gtfSYO8QthaARfp/nks0dLAw5Kw3rkI9YfDgbeh8OFRaCabZldhZ:IAfOfoqw3rkIeZJNtOvXhf
Score1/10 -
-
-
Target
setup.msi
-
Size
9.5MB
-
MD5
46320365bc145f26882cb4f33308218e
-
SHA1
d6ce63b6269812bc30e59870bfae2f25e4bd0020
-
SHA256
62ad0558d97b25b2e2cd9e4e72a70b3e98e621e24c2085096f652073f84852b3
-
SHA512
7e4214941ab680a6fd1e14dc8ae798b2bc8ae6df98cb5013377c5a96996fbcf4e6c02f9a1dc3093a8a1f099235e73baed64b7fac02054d17a28b75b6b7394d91
-
SSDEEP
196608:o7zS0y6AUPLvyghG/xZ272YRJPMIk81RURA8xRFIxa0Z7JSw:axLh2YR9Mt80K8tIxjVSw
Score6/10-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-