General
-
Target
f085588cf016993e6298640bf797c1d31b61a8087a3240d517a53a5a58474987
-
Size
951KB
-
Sample
220213-nq5m1sbddn
-
MD5
e2c5416931f1c9369fb55e7adcf6364b
-
SHA1
57c960dc13b433a3fe3225b884fcbccc01c00c36
-
SHA256
f085588cf016993e6298640bf797c1d31b61a8087a3240d517a53a5a58474987
-
SHA512
96e666f61ad0e1e1c9146b31ea94622004e9dcdd082372e5ae7dada1c3aa28538d506c870502be8b381170a2d60ea470e196141de0affab232d8a106fa4ca51e
Static task
static1
Behavioral task
behavioral1
Sample
f085588cf016993e6298640bf797c1d31b61a8087a3240d517a53a5a58474987.msi
Resource
win7-en-20211208
Malware Config
Targets
-
-
Target
f085588cf016993e6298640bf797c1d31b61a8087a3240d517a53a5a58474987
-
Size
951KB
-
MD5
e2c5416931f1c9369fb55e7adcf6364b
-
SHA1
57c960dc13b433a3fe3225b884fcbccc01c00c36
-
SHA256
f085588cf016993e6298640bf797c1d31b61a8087a3240d517a53a5a58474987
-
SHA512
96e666f61ad0e1e1c9146b31ea94622004e9dcdd082372e5ae7dada1c3aa28538d506c870502be8b381170a2d60ea470e196141de0affab232d8a106fa4ca51e
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-