General
-
Target
e4318d3dd5e9226dde8f8b828d819fe44742d0526d388792f91a6c72b50368d5
-
Size
437KB
-
Sample
241002-cmp8dasbjp
-
MD5
1cc48a5c68664eb22f9fdae247954055
-
SHA1
b7f9fe8a60f1f59b7a780122ed4ea13b9d6426d3
-
SHA256
e4318d3dd5e9226dde8f8b828d819fe44742d0526d388792f91a6c72b50368d5
-
SHA512
b7804d1f07d9d6e20d380a3fe7fe4ce731de043caadc39c31ccc424c3b146121adefc3ac37e157130283886ac87a8045d03b664406383dcc26a8820889460fed
-
SSDEEP
6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6WC:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoSY
Behavioral task
behavioral1
Sample
e4318d3dd5e9226dde8f8b828d819fe44742d0526d388792f91a6c72b50368d5.dll
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
e4318d3dd5e9226dde8f8b828d819fe44742d0526d388792f91a6c72b50368d5
-
Size
437KB
-
MD5
1cc48a5c68664eb22f9fdae247954055
-
SHA1
b7f9fe8a60f1f59b7a780122ed4ea13b9d6426d3
-
SHA256
e4318d3dd5e9226dde8f8b828d819fe44742d0526d388792f91a6c72b50368d5
-
SHA512
b7804d1f07d9d6e20d380a3fe7fe4ce731de043caadc39c31ccc424c3b146121adefc3ac37e157130283886ac87a8045d03b664406383dcc26a8820889460fed
-
SSDEEP
6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6WC:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoSY
-
Detect Blackmoon payload
-
Gh0st RAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-