General
-
Target
7f73ee5138db77a192db3b998d23118865149553f025ca678a75924f7b03a3fb
-
Size
431KB
-
Sample
241013-e8w9xstdql
-
MD5
30326c52637f97187c6d489623ae2a7c
-
SHA1
babb11ae428d59517f0a36d64bccede6ce096747
-
SHA256
7f73ee5138db77a192db3b998d23118865149553f025ca678a75924f7b03a3fb
-
SHA512
acd68c6cac96d88ece2c06ffa69d9ff52393ef5244c2603382ef0232c7539e9b883ef3d2e9a5413374b60e7a8525e6cdb247abbe9888e24c6656523d63657647
-
SSDEEP
12288:BajL+BfqlWhVqmhbS975O2ZJIYiR6GhR2gKSQ6rs50U:BanutMmc51J1iHhEz9680U
Behavioral task
behavioral1
Sample
7f73ee5138db77a192db3b998d23118865149553f025ca678a75924f7b03a3fb.dll
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
7f73ee5138db77a192db3b998d23118865149553f025ca678a75924f7b03a3fb
-
Size
431KB
-
MD5
30326c52637f97187c6d489623ae2a7c
-
SHA1
babb11ae428d59517f0a36d64bccede6ce096747
-
SHA256
7f73ee5138db77a192db3b998d23118865149553f025ca678a75924f7b03a3fb
-
SHA512
acd68c6cac96d88ece2c06ffa69d9ff52393ef5244c2603382ef0232c7539e9b883ef3d2e9a5413374b60e7a8525e6cdb247abbe9888e24c6656523d63657647
-
SSDEEP
12288:BajL+BfqlWhVqmhbS975O2ZJIYiR6GhR2gKSQ6rs50U:BanutMmc51J1iHhEz9680U
-
Detect Blackmoon payload
-
Gh0st RAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-