Resubmissions
02/12/2024, 01:29 UTC
241202-bwgrxsslev 601/12/2024, 01:16 UTC
241201-bm536a1rbv 701/12/2024, 01:06 UTC
241201-bf6q4swlcn 630/11/2024, 23:55 UTC
241130-3yyxrstqbq 630/11/2024, 23:55 UTC
241130-3ypn4azjfv 630/11/2024, 23:35 UTC
241130-3lf67atmal 630/11/2024, 22:13 UTC
241130-15bppsxjhx 727/11/2024, 20:24 UTC
241127-y6snhaynhv 726/11/2024, 17:03 UTC
241126-vkvzyswqdk 7General
-
Target
psr.exe
-
Size
13.4MB
-
Sample
241201-bm536a1rbv
-
MD5
33c9518c086d0cca4a636bc86728485e
-
SHA1
2420ad25e243ab8905b49f60fe7fb96590661f50
-
SHA256
ba30ea16cd8fbd9209d40ae193206ad00f042d100524cf310982c33369325ca2
-
SHA512
6c2c470607b88e7cd79411b7a645b395cee3306a23e6ba50b8ac57f7d5529a1b350c34e19da69aeb1ffade44d5187b4a1ef209a53d21a83e9e35add10fc7867d
-
SSDEEP
49152:W/XzWTJmbjeHLKLpyNpaQ+69tPvGUmskDXs4Awd9CBqcUiInvlT2hPnXiwzYJ33S:W/EmGrKL2pllzP+UNkEARmzY1C
Static task
static1
Behavioral task
behavioral1
Sample
psr.exe
Resource
win11-20241023-en
Malware Config
Targets
-
-
Target
psr.exe
-
Size
13.4MB
-
MD5
33c9518c086d0cca4a636bc86728485e
-
SHA1
2420ad25e243ab8905b49f60fe7fb96590661f50
-
SHA256
ba30ea16cd8fbd9209d40ae193206ad00f042d100524cf310982c33369325ca2
-
SHA512
6c2c470607b88e7cd79411b7a645b395cee3306a23e6ba50b8ac57f7d5529a1b350c34e19da69aeb1ffade44d5187b4a1ef209a53d21a83e9e35add10fc7867d
-
SSDEEP
49152:W/XzWTJmbjeHLKLpyNpaQ+69tPvGUmskDXs4Awd9CBqcUiInvlT2hPnXiwzYJ33S:W/EmGrKL2pllzP+UNkEARmzY1C
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-