General
-
Target
vfdjo.exe
-
Size
35KB
-
Sample
250101-jtnfpa1rfr
-
MD5
a03f28f2c0bf87d438a28e815d4b458a
-
SHA1
60627893ce5e918c9b3dbe146f1b577f630129b5
-
SHA256
1c9f4869c446e6e1e3c562631b1a10210294a7dd1367b4a58450b1a949e873e9
-
SHA512
7ee6455f78cca337042521d024cdd4a54903e0b2276588b400fc9043354df28ca9cf0c9244028656c2e5e44e9f4889288aaa72e6d4ddb101380fb24d95727738
-
SSDEEP
768:deBwuYH/uhx4yQF1F5e2nTesOhCZC3JtdkrDNxHloAnOT+k0uvN:dwwV2IfjeOOhCkmBlS+knN
Static task
static1
Behavioral task
behavioral1
Sample
vfdjo.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
vfdjo.exe
-
Size
35KB
-
MD5
a03f28f2c0bf87d438a28e815d4b458a
-
SHA1
60627893ce5e918c9b3dbe146f1b577f630129b5
-
SHA256
1c9f4869c446e6e1e3c562631b1a10210294a7dd1367b4a58450b1a949e873e9
-
SHA512
7ee6455f78cca337042521d024cdd4a54903e0b2276588b400fc9043354df28ca9cf0c9244028656c2e5e44e9f4889288aaa72e6d4ddb101380fb24d95727738
-
SSDEEP
768:deBwuYH/uhx4yQF1F5e2nTesOhCZC3JtdkrDNxHloAnOT+k0uvN:dwwV2IfjeOOhCkmBlS+knN
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Venomrat family
-
Downloads MZ/PE file
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-