Resubmissions
04/10/2024, 10:13
241004-l9e6cssere 104/10/2024, 10:04
241004-l3149axgmp 1003/10/2024, 15:46
241003-s7y9satapn 903/10/2024, 15:29
241003-sw7rsawcmb 802/10/2024, 20:04
241002-ythb1axfje 802/10/2024, 20:04
241002-ytal6atgnk 102/10/2024, 20:03
241002-ys13qatgmp 102/10/2024, 20:03
241002-ystnmstglr 102/10/2024, 20:03
241002-ysngmaxeph 1General
-
Target
dsadas.jpg
-
Size
10KB
-
Sample
241003-sw7rsawcmb
-
MD5
38b86b2126e47a162e5460c5ad57dd5c
-
SHA1
6b47552276c5bf7f4e475f066a5c249cb3f1186b
-
SHA256
5f890a7ebad01a86cf730f4494c11e21ed486dc8dbc4b1305d8227ff025c5d4e
-
SHA512
4cb012f4dfdfffd596f091a076ad265d5b464095d28cc55a196fa8231ff811db3d52983e0911e12b4f303e7f1b5fff73539e19f8c0f88632238325f8b56e33ae
-
SSDEEP
192:Qm9xJHwQr9pgh/KDWHCSh4ETVAu2dwYnf3rfb/pRA0hK7auJ:9x5ww9pghBZOu2dw4Prb/BK7auJ
Static task
static1
Behavioral task
behavioral1
Sample
dsadas.jpg
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
dsadas.jpg
-
Size
10KB
-
MD5
38b86b2126e47a162e5460c5ad57dd5c
-
SHA1
6b47552276c5bf7f4e475f066a5c249cb3f1186b
-
SHA256
5f890a7ebad01a86cf730f4494c11e21ed486dc8dbc4b1305d8227ff025c5d4e
-
SHA512
4cb012f4dfdfffd596f091a076ad265d5b464095d28cc55a196fa8231ff811db3d52983e0911e12b4f303e7f1b5fff73539e19f8c0f88632238325f8b56e33ae
-
SSDEEP
192:Qm9xJHwQr9pgh/KDWHCSh4ETVAu2dwYnf3rfb/pRA0hK7auJ:9x5ww9pghBZOu2dw4Prb/BK7auJ
Score8/10-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Modifies WinLogon
-
Sets desktop wallpaper using registry
-