General
-
Target
058fcaa70076bfb93ee23c2ff68faa19d66ad785f14777bdb901a2aa12f745cb
-
Size
431KB
-
Sample
241230-r2qvsaxmfp
-
MD5
cbee3ceaadd9bd0a4ecead99533170cf
-
SHA1
d71efcb3d4481e1995dd4cdfe2d76b143c972de1
-
SHA256
058fcaa70076bfb93ee23c2ff68faa19d66ad785f14777bdb901a2aa12f745cb
-
SHA512
89c180ac7ffd58c1a7609769fce8290c5562e5eff9063bcbdb75645269db537d6b06903909882c9ee5d2cee7a32991b31c841088dc4554f8b726bb97117b2eae
-
SSDEEP
12288:IXi0ig1VCpPgYO+TqxeqFcOH72olHki98:IXivg1VCpZOCqxkOH7TBq
Behavioral task
behavioral1
Sample
058fcaa70076bfb93ee23c2ff68faa19d66ad785f14777bdb901a2aa12f745cb.dll
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
058fcaa70076bfb93ee23c2ff68faa19d66ad785f14777bdb901a2aa12f745cb
-
Size
431KB
-
MD5
cbee3ceaadd9bd0a4ecead99533170cf
-
SHA1
d71efcb3d4481e1995dd4cdfe2d76b143c972de1
-
SHA256
058fcaa70076bfb93ee23c2ff68faa19d66ad785f14777bdb901a2aa12f745cb
-
SHA512
89c180ac7ffd58c1a7609769fce8290c5562e5eff9063bcbdb75645269db537d6b06903909882c9ee5d2cee7a32991b31c841088dc4554f8b726bb97117b2eae
-
SSDEEP
12288:IXi0ig1VCpPgYO+TqxeqFcOH72olHki98:IXivg1VCpZOCqxkOH7TBq
-
Blackmoon family
-
Detect Blackmoon payload
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-