General
-
Target
5890798F97F9144206499433A5DB3011.zip
-
Size
202KB
-
Sample
250113-w5df3svlhq
-
MD5
39eb5d149bf0ef80cf1f3b316b64acf9
-
SHA1
afd8cb44b4922bc5fde65d7a5942373bd6c5a9bb
-
SHA256
1baf6b4580563c43bfcf27751c7773f103c584461197932bee9e6cce94e97833
-
SHA512
69787ace1018646426d4f0f357c38ba2757f61133d3d41d4e6362c43b035df5fe72e038d92eb795d17eada84c7fc00e027b86ce2b56ec32db7a3288d22ae9f09
-
SSDEEP
6144:4vSDvlEBjZ9TBKYdfsaUrmTPvSdMrvU2lTcCA:4qwt9TB30N6PXrvXTzA
Static task
static1
Behavioral task
behavioral1
Sample
5890798F97F9144206499433A5DB3011.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
5890798F97F9144206499433A5DB3011
-
Size
701KB
-
MD5
5890798f97f9144206499433a5db3011
-
SHA1
1c9c488123a81bf8d2216ac57c089e056f899433
-
SHA256
69be5428a0e939a5bf4453b34aad1a86791ab75411b6a339d727197f82bc8411
-
SHA512
964f340060a67abed11d06ac40cb8cb2577f985e8815cc12f306e37a716792ae8edac02645d0cddeea5d81f72ef402363c909b6f510eb2a37c76f1cf56caada9
-
SSDEEP
6144:57A/MmghsENIsRctX5rUvQSNj0LZOWM8yucn:5U/Mv0rU1Nj0LZOd8yus
Score8/10-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-