General
-
Target
Let's%20Compress.exe
-
Size
16.8MB
-
Sample
241120-red8gaybpq
-
MD5
c34118d64ca94041f56cbeba5daf9abd
-
SHA1
14ef602cc6ea87ac0f961fc3dac25a4e56923e00
-
SHA256
61c1c11c4054e61ab9fa8777caeaf9c84821ad1b7e773e4bc8b5d844d90e8c7d
-
SHA512
ca6878539c9e4f590f628785794ee1fe7c0f0cb8148ef0657e57de33d37595439731b299a42008a6fc6cb282da6cca97adc48f9e52ca083d171568a9f1f3d150
-
SSDEEP
393216:neTuAoAu6yJEULuZmyGdM90bq/5H7hifJJ8fM:nAJZcEUSG40bY1ihJ8U
Static task
static1
Malware Config
Targets
-
-
Target
Let's%20Compress.exe
-
Size
16.8MB
-
MD5
c34118d64ca94041f56cbeba5daf9abd
-
SHA1
14ef602cc6ea87ac0f961fc3dac25a4e56923e00
-
SHA256
61c1c11c4054e61ab9fa8777caeaf9c84821ad1b7e773e4bc8b5d844d90e8c7d
-
SHA512
ca6878539c9e4f590f628785794ee1fe7c0f0cb8148ef0657e57de33d37595439731b299a42008a6fc6cb282da6cca97adc48f9e52ca083d171568a9f1f3d150
-
SSDEEP
393216:neTuAoAu6yJEULuZmyGdM90bq/5H7hifJJ8fM:nAJZcEUSG40bY1ihJ8U
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-