General
-
Target
amayui_cracker.rar
-
Size
8.7MB
-
Sample
241006-jn54jswakp
-
MD5
006f0075694b26913b61cb81b163adb4
-
SHA1
5a468e13be21f1e70732dcf4c3a8f614ac71ead4
-
SHA256
463408ee65d826d76aedbb40faf5b457e005cef80be0bed20ae6b1c4a9bc5941
-
SHA512
98a0b793fbe46c809744d02da0525b53f4daebfb0546b8098d708f20bdbbb2cfc798738e42c7045d8a18bbd255b87591a08fc9f212aba41bdd2d3931e97f35f4
-
SSDEEP
196608:iTPrGZsHHNguzCpIfW88eSPl40QyosTeXX2wncjvwBq:gKWHHSuzC0W8APlNQd2EBncjvwE
Behavioral task
behavioral1
Sample
amayui_lm_101/amayui_lm_101.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
amayui_lm_101/amayui_lm_101.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
amayui_lm_101/amayui_lm_101.exe
-
Size
7.2MB
-
MD5
38b95c3a8222ae10560f98d6223d6d3f
-
SHA1
7f3b43d96afe5aaa61e4f79ecaee2fd304f1f4c9
-
SHA256
dabcbb6158e356e9d93c470223970aef8277c7d3dfa965971b6ac693bb66f183
-
SHA512
130ca34b8786d8045cafd5ad990b6922118e22c70326bf6fd032f01ffef5d2b2fe7ed477857fcecfd5ec49dff7b4e7ed830848b21ba571a176b27812614fce7f
-
SSDEEP
98304:uupm5ddO3wXcWqhZo4HLzEDoInOX3sMijq2KnPdAB6yAURzBSwR1cfv8Orp3R4xz:zyd1cdo4HH2Oqu2CdM1FiwvqfX4tH
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-