General
-
Target
0839190034df3cc414fa255d2283de3c.bin
-
Size
549KB
-
Sample
241118-bc2b8ayram
-
MD5
831eb1b0d4538ede75868962e1b66050
-
SHA1
4fe2fa19a8cae8061093a796d454de607e6cc3c3
-
SHA256
9a0160601325a3f1478b7248d8ba7b49fc90eb36fc518cc07533b49a89dbcae6
-
SHA512
6be02ba86a58904869338b705ae70fceced46c3afeae60cbc7a2d733898377adf743d138d59179f22322ac3741403f319751b2800dd3585277904059e40fd4dc
-
SSDEEP
12288:FRCsCe59jgkQCEsET7cvRiPCbz4wMrnQC0AaYUkzos7M2WWCWMwz:FRCsHv12/qZmrLavXxS
Static task
static1
Behavioral task
behavioral1
Sample
5fa128e617818eb6d70490ee47e4a8369e053fa5f7f7e79b982a120fe5bfe16d.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
5fa128e617818eb6d70490ee47e4a8369e053fa5f7f7e79b982a120fe5bfe16d.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Bygsukkerets/Wanderlusts.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Bygsukkerets/Wanderlusts.ps1
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
5fa128e617818eb6d70490ee47e4a8369e053fa5f7f7e79b982a120fe5bfe16d.exe
-
Size
687KB
-
MD5
0839190034df3cc414fa255d2283de3c
-
SHA1
ee691b6f85474654165db8ba8bfaee3ba1e536e0
-
SHA256
5fa128e617818eb6d70490ee47e4a8369e053fa5f7f7e79b982a120fe5bfe16d
-
SHA512
6f64f51cf8b428959a83e7e2da743faec564d9c71659a51696cea4f9bc5b70fc713a010dcf3d99de47534cabba39e9e9616a34ded6633b891ea7ea7f93127903
-
SSDEEP
12288:G0mnA1zcV/ErmWHObMmFPOeK5Wia8r9t3DSDb4NP:uA1zcMmJomFPs5We3ew5
Score10/10-
Guloader family
-
Blocklisted process makes network request
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
Bygsukkerets/Wanderlusts.Uto
-
Size
52KB
-
MD5
97c0731e8a832706f3f157e89ce3999b
-
SHA1
8665ec5d2421bf666bd1bdc2b81876f582aa7a5d
-
SHA256
e7d18aee03c79a8a55e2f0fc47ad0693c0bd5ba584b879c82624b4c80946b432
-
SHA512
283ab18b29f488197daaeec4e7ddfc2b707e13c15c308c7f2b3b8bb492833e2a0bff70a5fe4ef5b2cce51830492785fc6c13a1eb69c60db39578dd5a39b78731
-
SSDEEP
1536:ATz1EnqDuXf0VfLfTxv5P30atVCOKxoSbg5/StPv:ATZEnqDEf0VTfTxx30ecoQeS
Score8/10-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-