General
-
Target
d53b12f422a463bf4006875933fb3336b580078f247e4c661571fe83154bf31b
-
Size
437KB
-
Sample
240919-r3q7yatejf
-
MD5
893ffac5398d65b1e17378527553d513
-
SHA1
5dcda28ef8b4582f3072b1d50bad4e9de36eb21e
-
SHA256
d53b12f422a463bf4006875933fb3336b580078f247e4c661571fe83154bf31b
-
SHA512
ff0f92e3961cefb14198abaa2d5f2bbab3eb7a1540116d3aa731da248bf98e790f77f29396a82669435f4f156f997c35b3f60cc4b2becd5a882677144a083dae
-
SSDEEP
6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6WX:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoSN
Behavioral task
behavioral1
Sample
d53b12f422a463bf4006875933fb3336b580078f247e4c661571fe83154bf31b.dll
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
d53b12f422a463bf4006875933fb3336b580078f247e4c661571fe83154bf31b
-
Size
437KB
-
MD5
893ffac5398d65b1e17378527553d513
-
SHA1
5dcda28ef8b4582f3072b1d50bad4e9de36eb21e
-
SHA256
d53b12f422a463bf4006875933fb3336b580078f247e4c661571fe83154bf31b
-
SHA512
ff0f92e3961cefb14198abaa2d5f2bbab3eb7a1540116d3aa731da248bf98e790f77f29396a82669435f4f156f997c35b3f60cc4b2becd5a882677144a083dae
-
SSDEEP
6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6WX:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoSN
-
Detect Blackmoon payload
-
Gh0st RAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-