General
-
Target
4d969f98a7dbc486644def9170d81dabb25cb8228d2097da076de805833db2df
-
Size
13.1MB
-
Sample
240630-sypzrazela
-
MD5
502174b243ece86541f68d5757badf62
-
SHA1
59e6b01c1ab57d48a9e1a91986c65e320f000aa5
-
SHA256
4d969f98a7dbc486644def9170d81dabb25cb8228d2097da076de805833db2df
-
SHA512
f313afade587ad9ccaaa1400e6b0aa8a1321e3d8bd7693a2e40647bcce787851508c877e71f0b2a1bba4a6411efe90578936503857f7b75e0bccc0ad9e8e069e
-
SSDEEP
393216:Fv5Crp0nzTy0phSSsyV0kEvpW8cPHfu7pD72Od:ThpEdyCi/mpuOd
Behavioral task
behavioral1
Sample
??????.exe
Resource
win7-20240508-en
Malware Config
Targets
-
-
Target
??????.exe
-
Size
13.2MB
-
MD5
4d65014ca7fab35caae9d8ac24815e4b
-
SHA1
55d201d950e1053905f191f437962ea4992dbe86
-
SHA256
7d1e09800698caf357c17ddc003e443143a9748230a04acbcb0d3487a0a622c4
-
SHA512
bb668f2a0b42af7b7602c2a016966dace91144d21f9aee03a685190a172b3310dd580fcdac5bc1d3ec68b95fd52c01ceb2a48f1adbd4c13aebe07c1e1130dc19
-
SSDEEP
393216:gPDPWrjWiaqTjWU5JUkCoAvpyS+Vb3izzn72YZ:YKO8JUN0b+zSYZ
-
Detect Blackmoon payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-