General
-
Target
2fae0d8ced77e402210070aeac334a00d630e5d9afaf759e92220a43e4647aa9.exe
-
Size
1.1MB
-
Sample
250110-r9c9naxnev
-
MD5
973938878b8829539ece59580fa38d52
-
SHA1
f17a983c816cc780138c32ccd8539d45aa90f17b
-
SHA256
2fae0d8ced77e402210070aeac334a00d630e5d9afaf759e92220a43e4647aa9
-
SHA512
6a75b87931446c517e9e374da662253596f17999cb87bb7dbaeb25b688027ce6812608fb55984e60826767ff5e73331ae06b37bf5a7325252353858a96529844
-
SSDEEP
24576:AS8Rx51eg82JyXV2GFhq8oOQxdVo18vBtpPibY1:ezCOsl2GFhWOQxdGctwI
Static task
static1
Behavioral task
behavioral1
Sample
2fae0d8ced77e402210070aeac334a00d630e5d9afaf759e92220a43e4647aa9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2fae0d8ced77e402210070aeac334a00d630e5d9afaf759e92220a43e4647aa9.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Bredsvaerd.ps1
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Bredsvaerd.ps1
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2fae0d8ced77e402210070aeac334a00d630e5d9afaf759e92220a43e4647aa9.exe
-
Size
1.1MB
-
MD5
973938878b8829539ece59580fa38d52
-
SHA1
f17a983c816cc780138c32ccd8539d45aa90f17b
-
SHA256
2fae0d8ced77e402210070aeac334a00d630e5d9afaf759e92220a43e4647aa9
-
SHA512
6a75b87931446c517e9e374da662253596f17999cb87bb7dbaeb25b688027ce6812608fb55984e60826767ff5e73331ae06b37bf5a7325252353858a96529844
-
SSDEEP
24576:AS8Rx51eg82JyXV2GFhq8oOQxdVo18vBtpPibY1:ezCOsl2GFhWOQxdGctwI
Score10/10-
Guloader family
-
Loads dropped DLL
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
Bredsvaerd.Cop
-
Size
53KB
-
MD5
c556c0c8c2ec04a75e7c7c3a2f97129f
-
SHA1
bd35a6371a4550ce15dd53928da6cc7b4ad008c1
-
SHA256
a45adf7a90cba3399fa70a4730d308b1fce47367c81a7f379f3b45d5eb2f4475
-
SHA512
b19b59a22651fd889f04ec40a625aef213dba51ea0a8ec2ba24f40f87589ed013ffdb4432d0dd3cc90287e9a73cba52114849542617c376ce5fcfc5cedfec8ec
-
SSDEEP
768:tjSc3aZguzsPXToIx+pUOugyGKxggqY/L078BxQE+++FoMoNGmxLenLYuI9jzgAd:xj3aZXwXT+OhByvcjNGmdeL+yAQI6+
Score8/10-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-