General
-
Target
7398af209fd81ba1de482de57e2e09a147a9276ba6b86fdd7adc8ccf6cdd1e22N
-
Size
64KB
-
Sample
241021-3vbm3awbrj
-
MD5
3e02ff9d47baaaf71d03f88b26905660
-
SHA1
1af97779e931f4709ddaa1f0d559c3c34b716270
-
SHA256
7398af209fd81ba1de482de57e2e09a147a9276ba6b86fdd7adc8ccf6cdd1e22
-
SHA512
339509048274c596079f2dcccc6046d71907f291d323a32ff561e511ad9037b8095ad2c599b489bfc3252823aba73e5925f0920c37f00179bb9b137c556313d9
-
SSDEEP
1536:mE08PWImRXI5Z13toMJu06BF6KTdFY5v4AkN8:22WIQXM13tHcBF6KTdq5kN8
Static task
static1
Behavioral task
behavioral1
Sample
7398af209fd81ba1de482de57e2e09a147a9276ba6b86fdd7adc8ccf6cdd1e22N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7398af209fd81ba1de482de57e2e09a147a9276ba6b86fdd7adc8ccf6cdd1e22N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
7398af209fd81ba1de482de57e2e09a147a9276ba6b86fdd7adc8ccf6cdd1e22N
-
Size
64KB
-
MD5
3e02ff9d47baaaf71d03f88b26905660
-
SHA1
1af97779e931f4709ddaa1f0d559c3c34b716270
-
SHA256
7398af209fd81ba1de482de57e2e09a147a9276ba6b86fdd7adc8ccf6cdd1e22
-
SHA512
339509048274c596079f2dcccc6046d71907f291d323a32ff561e511ad9037b8095ad2c599b489bfc3252823aba73e5925f0920c37f00179bb9b137c556313d9
-
SSDEEP
1536:mE08PWImRXI5Z13toMJu06BF6KTdFY5v4AkN8:22WIQXM13tHcBF6KTdq5kN8
Score10/10-
Detects Andromeda payload.
-
Adds policy Run key to start application
-
Deletes itself
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-