General
-
Target
605a7e9ff88673d278fe5146464280ac7a9601b48ab71bc816f5db3c0ba86609
-
Size
29KB
-
Sample
250109-vbmxzsxjej
-
MD5
3b2dc4dad3c5ce4ea2eb8a9605d406cd
-
SHA1
d894f18cc5e3b2d75fdfa60eb8ed9c8ddf922792
-
SHA256
605a7e9ff88673d278fe5146464280ac7a9601b48ab71bc816f5db3c0ba86609
-
SHA512
2ccbda37d4bffce082f01136b4a928124e7bedf6695f825e0c874bf913d36e342c5f899d829513480ef5626763451326adbeef5afb36ebf05428a005360e7bdd
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/7hQ:AEwVs+0jNDY1qi/qDm
Behavioral task
behavioral1
Sample
605a7e9ff88673d278fe5146464280ac7a9601b48ab71bc816f5db3c0ba86609.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
605a7e9ff88673d278fe5146464280ac7a9601b48ab71bc816f5db3c0ba86609
-
Size
29KB
-
MD5
3b2dc4dad3c5ce4ea2eb8a9605d406cd
-
SHA1
d894f18cc5e3b2d75fdfa60eb8ed9c8ddf922792
-
SHA256
605a7e9ff88673d278fe5146464280ac7a9601b48ab71bc816f5db3c0ba86609
-
SHA512
2ccbda37d4bffce082f01136b4a928124e7bedf6695f825e0c874bf913d36e342c5f899d829513480ef5626763451326adbeef5afb36ebf05428a005360e7bdd
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/7hQ:AEwVs+0jNDY1qi/qDm
Score10/10-
Detects MyDoom family
-
Mydoom family
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1