General
-
Target
a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe
-
Size
891KB
-
Sample
250108-h5xytssjeq
-
MD5
786c25a527904efd1896cad992c24340
-
SHA1
4ff649e40e118667e74d263b2348e8f6ece0013d
-
SHA256
a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778
-
SHA512
376f02b7990c05aa4ab92a3c5f8ec9a07f09f9566010429066c3a4cfc02d84393210abcde7e9924352d698b2c1271adb890891f1e9880458c35af33898b7a5c5
-
SSDEEP
12288:FX4u7Wsh0fn04UQ9r3SDDaVGo9r8T5fNl0HKjUME6+OeBmtBgPCNNnPkRwWjZPG1:FT34UQOoGQqxFjbE6+OHvg6WdZPBPI
Static task
static1
Behavioral task
behavioral1
Sample
a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778N.exe
-
Size
891KB
-
MD5
786c25a527904efd1896cad992c24340
-
SHA1
4ff649e40e118667e74d263b2348e8f6ece0013d
-
SHA256
a0bc20c97c8a792a31af7788a766e3b9e7e8682cdd117bd4b06ad4d54b677778
-
SHA512
376f02b7990c05aa4ab92a3c5f8ec9a07f09f9566010429066c3a4cfc02d84393210abcde7e9924352d698b2c1271adb890891f1e9880458c35af33898b7a5c5
-
SSDEEP
12288:FX4u7Wsh0fn04UQ9r3SDDaVGo9r8T5fNl0HKjUME6+OeBmtBgPCNNnPkRwWjZPG1:FT34UQOoGQqxFjbE6+OHvg6WdZPBPI
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-