General
-
Target
DJI+Assistant+2+For+Mavic+2.0.14.exe
-
Size
220.9MB
-
Sample
241217-tm7k4aspb1
-
MD5
5ed21360de855550b5d76fd3b58a0d9c
-
SHA1
8ec79d60dc65fa62d28fc34a0d729cfc5b58968b
-
SHA256
d5df2d8ea45e881670a9b723a495363fb198700a60b47cba5507bf1164e14698
-
SHA512
659b3d430259e13ae26422b3c79ba5cc1a41e319f690a9947b310e073260f21204432a5ad752e615146a338ef9d6f26eac78fa9418e73451cbb7fbbffdbfd6d7
-
SSDEEP
6291456:9Zd82MdKKBxeHHR6z9PXGGYt4+mfRci0DkkCc78LE:9VMdvBxeHoJXGftPj8g
Static task
static1
Behavioral task
behavioral1
Sample
DJI+Assistant+2+For+Mavic+2.0.14.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
DJI+Assistant+2+For+Mavic+2.0.14.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
DJI+Assistant+2+For+Mavic+2.0.14.exe
-
Size
220.9MB
-
MD5
5ed21360de855550b5d76fd3b58a0d9c
-
SHA1
8ec79d60dc65fa62d28fc34a0d729cfc5b58968b
-
SHA256
d5df2d8ea45e881670a9b723a495363fb198700a60b47cba5507bf1164e14698
-
SHA512
659b3d430259e13ae26422b3c79ba5cc1a41e319f690a9947b310e073260f21204432a5ad752e615146a338ef9d6f26eac78fa9418e73451cbb7fbbffdbfd6d7
-
SSDEEP
6291456:9Zd82MdKKBxeHHR6z9PXGGYt4+mfRci0DkkCc78LE:9VMdvBxeHoJXGftPj8g
-
Zebrocy Go Variant
-
Zebrocy family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-