General
-
Target
f1c1a0145bbf231c4866d43ec8180ca10c50f54bb72ddd3ed068d90b36b429b6
-
Size
122KB
-
Sample
241009-flbv5sthjc
-
MD5
92f110f3c314e971c03e931344480466
-
SHA1
bf2ca29a81820bd364846b3533aaf431dc23cea6
-
SHA256
f1c1a0145bbf231c4866d43ec8180ca10c50f54bb72ddd3ed068d90b36b429b6
-
SHA512
492bfdaa99d0e727c1d6b5ead75954e2a4ffdc5d819db5244347f3bd98d2043492bdf9b0e065eaa89f299a081cfda22d5cf80db0376b6a5b57205fc799387821
-
SSDEEP
1536:7UdrF741HktQ5Xn1go9i/1KTINXA1lf3WoS:OF741h579idDNelfL
Behavioral task
behavioral1
Sample
f1c1a0145bbf231c4866d43ec8180ca10c50f54bb72ddd3ed068d90b36b429b6.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
f1c1a0145bbf231c4866d43ec8180ca10c50f54bb72ddd3ed068d90b36b429b6
-
Size
122KB
-
MD5
92f110f3c314e971c03e931344480466
-
SHA1
bf2ca29a81820bd364846b3533aaf431dc23cea6
-
SHA256
f1c1a0145bbf231c4866d43ec8180ca10c50f54bb72ddd3ed068d90b36b429b6
-
SHA512
492bfdaa99d0e727c1d6b5ead75954e2a4ffdc5d819db5244347f3bd98d2043492bdf9b0e065eaa89f299a081cfda22d5cf80db0376b6a5b57205fc799387821
-
SSDEEP
1536:7UdrF741HktQ5Xn1go9i/1KTINXA1lf3WoS:OF741h579idDNelfL
-
Detect Blackmoon payload
-
Gh0st RAT payload
-
Downloads MZ/PE file
-
Modifies RDP port number used by Windows
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-