General
-
Target
3ad5eda009261333870f4bf241ac556b8bcc7e7d2e0395b204256c8ea2402775N
-
Size
437KB
-
Sample
241001-v1nwks1gnp
-
MD5
f111d4370e3267a0a91dfeab083756f0
-
SHA1
c4660bd2a09217e8db5bca929ecc0e840e3b9650
-
SHA256
3ad5eda009261333870f4bf241ac556b8bcc7e7d2e0395b204256c8ea2402775
-
SHA512
917e70333aff3e5b76c1582326618670bc6a6ea473bba690628cfcf12358dde7399b3706f1c8f7bf8a95dbe6315cd1f0bde1795059c98edbb49300b09bc5eadd
-
SSDEEP
6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6Wl:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoS/
Behavioral task
behavioral1
Sample
3ad5eda009261333870f4bf241ac556b8bcc7e7d2e0395b204256c8ea2402775N.dll
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
3ad5eda009261333870f4bf241ac556b8bcc7e7d2e0395b204256c8ea2402775N
-
Size
437KB
-
MD5
f111d4370e3267a0a91dfeab083756f0
-
SHA1
c4660bd2a09217e8db5bca929ecc0e840e3b9650
-
SHA256
3ad5eda009261333870f4bf241ac556b8bcc7e7d2e0395b204256c8ea2402775
-
SHA512
917e70333aff3e5b76c1582326618670bc6a6ea473bba690628cfcf12358dde7399b3706f1c8f7bf8a95dbe6315cd1f0bde1795059c98edbb49300b09bc5eadd
-
SSDEEP
6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6Wl:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoS/
-
Detect Blackmoon payload
-
Gh0st RAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-