Bdm5-20.7z <2025-2026>

An initial executable ( ntstatus.exe ) loads the encrypted data.

(e.g., SIEM alert, suspicious email, manual discovery) System Type (e.g., server, workstation, air-gapped network)

The archive contains a highly obfuscated malware sample that uses machine-specific hardware IDs to prevent independent analysis. CovalentStealer. BDM5-20.7z

157a0ffd18e05bfd90a4ec108e5458cbde01015e3407b3964732c9d4ceb71656

The file is heavily obfuscated and often bypasses standard YARA rules and signature-based antivirus detection during the initial stages of infection. Indicators of Compromise (IoCs) SHA-256 Hash ntstatus.exe An initial executable ( ntstatus

(e.g., incident response steps, further technical analysis) Malware Analysis Report - CISA

The malware within this archive employs several sophisticated anti-analysis and evasion techniques: manual discovery) System Type (e.g.

7-Zip Compressed Archive (.7z) containing encrypted binaries.

Arriba
Esta web usa cookies y participa en el Programa de Afiliados de Amazon EU, un programa de publicidad para afiliados diseñado para ofrecer a sitios web un modo de obtener comisiones por publicidad, publicitando e incluyendo enlaces a Amazon.es . En calidad de Afiliado de Amazon, obtengo ingresos por las compras adscritas que cumplen los requisitos aplicables