General
-
Target
agent.bin.zip
-
Size
10.4MB
-
Sample
201211-jv31s6lfas
-
MD5
eee08cc25601be900d0aa9ccefb2a09b
-
SHA1
595b0da77617cc7986123783fe30d0179031be60
-
SHA256
7ce7f0f0786b3da3e605dbbbc9bc3ff7cc0099beedfcf4d4556576489abf86dc
-
SHA512
3553761d9f3c8423dbb9f912846aaa478e31dae0164b2bc3d7d62a0004f29197bae6deadbf0db1a7243cd98bef69df48d4146c0b19906350149c7feac2110555
Static task
static1
Behavioral task
behavioral1
Sample
agent.bin.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
agent.bin
-
Size
10.9MB
-
MD5
921f0eb14ea4bb8ec85c307da29a66cd
-
SHA1
35b61e6d895627a10015dcd4c0d03c4423a02d0d
-
SHA256
3d0862aa6676aa428e26e0b1c813c090c410b759fa7e9cdf8b0eb9d313d3618c
-
SHA512
9125f936b12fc3c30be7a33a4d61bde1267f89bd8adee977664759bb410987c0055131187603e5007faaf80ffdd7cd79b46878471eb71fb73a13db81657660d7
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
JavaScript code in executable
-
Drops file in System32 directory
-