General
-
Target
ed142ec379e233ca448495a299adc41f5c329f70e5ad844093c8fc3bfaf8bd83
-
Size
437KB
-
Sample
240924-rabxjsxfnn
-
MD5
ae56dc37553ae4a224b6c7a3871cbf36
-
SHA1
2d591862f5bcbe44d88d50c57ebbde4545c1daa9
-
SHA256
ed142ec379e233ca448495a299adc41f5c329f70e5ad844093c8fc3bfaf8bd83
-
SHA512
3390a1dfe358b4c5210873f7ef83b7784ae1996c4eeca0dbbb2c7b5ed6fa3756010fb5003d0e510cf063dc8258199189e2b62feed68e3acc8c356e76a5753474
-
SSDEEP
6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6WM:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoSW
Behavioral task
behavioral1
Sample
ed142ec379e233ca448495a299adc41f5c329f70e5ad844093c8fc3bfaf8bd83.dll
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
ed142ec379e233ca448495a299adc41f5c329f70e5ad844093c8fc3bfaf8bd83
-
Size
437KB
-
MD5
ae56dc37553ae4a224b6c7a3871cbf36
-
SHA1
2d591862f5bcbe44d88d50c57ebbde4545c1daa9
-
SHA256
ed142ec379e233ca448495a299adc41f5c329f70e5ad844093c8fc3bfaf8bd83
-
SHA512
3390a1dfe358b4c5210873f7ef83b7784ae1996c4eeca0dbbb2c7b5ed6fa3756010fb5003d0e510cf063dc8258199189e2b62feed68e3acc8c356e76a5753474
-
SSDEEP
6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6WM:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoSW
-
Detect Blackmoon payload
-
Gh0st RAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-