General
-
Target
d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6
-
Size
6.3MB
-
Sample
220119-t2pntsbeh3
-
MD5
d8f03daa4389b4e6ce37a3d3664e74f5
-
SHA1
9f044353923afec678d50777e8dc2e18a4b5ce21
-
SHA256
d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6
-
SHA512
4ea37e044be69b88c53f7bdecd0eb5c431fc3f112bd1cfd53942463756cd3187a3a5a2ead9a4ea82f6fc323213a17b9231d6ce9493f68cfe71aac250121a99f9
Static task
static1
Behavioral task
behavioral1
Sample
d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe
Resource
win7-en-20211208
Malware Config
Extracted
cryptbot
veowvf15.top
morysl01.top
-
payload_url
http://tyngle01.top/download.php?file=lv.exe
Targets
-
-
Target
d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6
-
Size
6.3MB
-
MD5
d8f03daa4389b4e6ce37a3d3664e74f5
-
SHA1
9f044353923afec678d50777e8dc2e18a4b5ce21
-
SHA256
d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6
-
SHA512
4ea37e044be69b88c53f7bdecd0eb5c431fc3f112bd1cfd53942463756cd3187a3a5a2ead9a4ea82f6fc323213a17b9231d6ce9493f68cfe71aac250121a99f9
-
Babadeda Crypter
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-