General
-
Target
7a77dec7a2a6cd2769e82ea0fd053881853c0f7612e605c41758952629740c19
-
Size
80KB
-
Sample
241218-ah45mavqfn
-
MD5
b07174fc391992f4bd743300a0fe745b
-
SHA1
8abfbd6137e367e13bc1a48210188dfbb7d46604
-
SHA256
7a77dec7a2a6cd2769e82ea0fd053881853c0f7612e605c41758952629740c19
-
SHA512
028cfc33a66ea62cf9c3b7731146e97f7042f20224bed9a922ef97b5546d4a2f6f06a62f184da51c042d462fcaa5085de0defc3dea47e3efda6dd60e83d60ea7
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEMLS:5dbwovEVyqgoZmZXWfIdQdRaefPhLS
Behavioral task
behavioral1
Sample
7a77dec7a2a6cd2769e82ea0fd053881853c0f7612e605c41758952629740c19.dll
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
7a77dec7a2a6cd2769e82ea0fd053881853c0f7612e605c41758952629740c19
-
Size
80KB
-
MD5
b07174fc391992f4bd743300a0fe745b
-
SHA1
8abfbd6137e367e13bc1a48210188dfbb7d46604
-
SHA256
7a77dec7a2a6cd2769e82ea0fd053881853c0f7612e605c41758952629740c19
-
SHA512
028cfc33a66ea62cf9c3b7731146e97f7042f20224bed9a922ef97b5546d4a2f6f06a62f184da51c042d462fcaa5085de0defc3dea47e3efda6dd60e83d60ea7
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEMLS:5dbwovEVyqgoZmZXWfIdQdRaefPhLS
Score8/10-
Blocklisted process makes network request
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-