General
-
Target
v4vcmk.exe
-
Size
235KB
-
Sample
220210-hn9lasfgel
-
MD5
e7a30a6b98068f2c28af36b58c314c6a
-
SHA1
4a366530e40c4ba0f6df97c8ebce2429aea6cc35
-
SHA256
fa5e38ff3f546827c5e62db27f12d68bcc4cb30285a329088c54995b2e4ec5d0
-
SHA512
8e8bff9a8c1976ca5724a8eaec77b81f7d057311021845aa3f72a6573bf25b189e715af3902fef76079e3dd2dcc6cf7ed513f9f8df9cf60c1e23439c990b33e6
Static task
static1
Behavioral task
behavioral1
Sample
v4vcmk.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
v4vcmk.exe
Resource
win10v2004-en-20220113
Malware Config
Targets
-
-
Target
v4vcmk.exe
-
Size
235KB
-
MD5
e7a30a6b98068f2c28af36b58c314c6a
-
SHA1
4a366530e40c4ba0f6df97c8ebce2429aea6cc35
-
SHA256
fa5e38ff3f546827c5e62db27f12d68bcc4cb30285a329088c54995b2e4ec5d0
-
SHA512
8e8bff9a8c1976ca5724a8eaec77b81f7d057311021845aa3f72a6573bf25b189e715af3902fef76079e3dd2dcc6cf7ed513f9f8df9cf60c1e23439c990b33e6
Score10/10-
Modifies visibility of file extensions in Explorer
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-