General
-
Target
9b0e04ba67af1e0d483a5596ce1f4e0866fedec766dbdcc8792b97289ed4d1e3.zip
-
Size
19.9MB
-
Sample
241121-h3gttszkh1
-
MD5
4ed9306b5dd32049c06821b66b76a6f3
-
SHA1
1c698d81d041bcfdbaa235bdf6544d298b8cd608
-
SHA256
9b0e04ba67af1e0d483a5596ce1f4e0866fedec766dbdcc8792b97289ed4d1e3
-
SHA512
e19903807e8bff3b9402edf247bced07d3f71d933b3d723aa36f0f82fb05123f526ad5eb4cbb5aba5bac8146dea27f80eab5f63df06cf327f4338e27653c0df3
-
SSDEEP
393216:eB7JyT7cOdSOZ0tC/y3lqfbnONQyC2fJ5dD2ZbYKJbv2F6DG0eaAJkNK:27JyMOdSOZ0cq3l42fJDG9jo6S0ehCw
Static task
static1
Behavioral task
behavioral1
Sample
cho_mea64.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
cho_mea64.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
cho_mea64.exe
-
Size
20.4MB
-
MD5
044f51347e293ac77de4cd47bdccbacf
-
SHA1
4c67777228575ac317c62855e6d9dd0a6da48c2d
-
SHA256
4ca9da66d04a5f68deb0bab55aca5d64b8d8307c58f2943d6a67a3b584855ee2
-
SHA512
f3976170a7f965f9674712904a0effc8383ea1a7ac5961a746b319d4659f52f82578b5adf4a0ca52f0434a896d310268ac7e40391fb0ea929a2482bb78aa0775
-
SSDEEP
393216:SiX7fx65E78eL1uwtkbZtqtQEt8+OIbyMl1PiT+KiSn7h6LPr8Y:bTxOEJuw+bP5krOIO3aKiSn7aPIY
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-