General
-
Target
Chromestup插件.msi
-
Size
13.4MB
-
Sample
250315-hqzh4szrt9
-
MD5
a476065df4bcac42aad4f3eeab3545b4
-
SHA1
4b60df157d79c4863a8065e149ec6e447d1a3342
-
SHA256
32cf48d0ef7ac450c80fcc9fb9ec28af88370298c36547d2a94ff882b12500ae
-
SHA512
0d5a5e298b145d61f17b6c3376011706535e3441f6b9c2346e67db4ce762fcbbb3da072d98f7bebc5f31885000cc0661951632508784ed7feeb61ff6c0597e95
-
SSDEEP
393216:pBfMDbMkh0n28RmwRRenYtpBRW9AxGq5azUUEC5:vMNSSnsjRaKDGEC5
Static task
static1
Behavioral task
behavioral1
Sample
Chromestup插件.msi
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Chromestup插件.msi
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
Chromestup插件.msi
-
Size
13.4MB
-
MD5
a476065df4bcac42aad4f3eeab3545b4
-
SHA1
4b60df157d79c4863a8065e149ec6e447d1a3342
-
SHA256
32cf48d0ef7ac450c80fcc9fb9ec28af88370298c36547d2a94ff882b12500ae
-
SHA512
0d5a5e298b145d61f17b6c3376011706535e3441f6b9c2346e67db4ce762fcbbb3da072d98f7bebc5f31885000cc0661951632508784ed7feeb61ff6c0597e95
-
SSDEEP
393216:pBfMDbMkh0n28RmwRRenYtpBRW9AxGq5azUUEC5:vMNSSnsjRaKDGEC5
-
Blackmoon family
-
Detect Blackmoon payload
-
Fatalrat family
-
Fatal Rat payload
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-