General
-
Target
dmaster.exe
-
Size
7.2MB
-
Sample
211014-hty2ragch7
-
MD5
84c4021135555ce4384f22c66ba4595b
-
SHA1
74a4051dc39188c1b90768204707ef641881ebf4
-
SHA256
0af06fb0a98f36849371c928af03a39c57e7596b32c806da9f358651714a2ac7
-
SHA512
1d43f69d504c890c3c050cfe05c6553cc3984cf5e0c6801c4c88cd1b53d935f507056b8aa060dd3d41af988146d3404ccadb143d002df155f6ae3d1e9dda0a32
Static task
static1
Malware Config
Targets
-
-
Target
dmaster.exe
-
Size
7.2MB
-
MD5
84c4021135555ce4384f22c66ba4595b
-
SHA1
74a4051dc39188c1b90768204707ef641881ebf4
-
SHA256
0af06fb0a98f36849371c928af03a39c57e7596b32c806da9f358651714a2ac7
-
SHA512
1d43f69d504c890c3c050cfe05c6553cc3984cf5e0c6801c4c88cd1b53d935f507056b8aa060dd3d41af988146d3404ccadb143d002df155f6ae3d1e9dda0a32
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-