General
-
Target
0f4dd1c10186f8682986732134e6f33f440fbdd999aff471aa82a782e6886819
-
Size
4.1MB
-
Sample
220326-zqnkaahda5
-
MD5
4db5c29f082e78410b0bb79137651ea4
-
SHA1
08a2226f1ac939aa8e5d542ef515f845c2a0fe10
-
SHA256
0f4dd1c10186f8682986732134e6f33f440fbdd999aff471aa82a782e6886819
-
SHA512
df92c5d6e2e6b29aec20f7dba871a43dd5c780cf0ecdbcb5c97cbc3f759871bb354eb4ecb39f749d578a2ebd405e3dd43733a9ea83b67157766076a7a2a63f53
Static task
static1
Behavioral task
behavioral1
Sample
0f4dd1c10186f8682986732134e6f33f440fbdd999aff471aa82a782e6886819.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
0f4dd1c10186f8682986732134e6f33f440fbdd999aff471aa82a782e6886819.exe
Resource
win10v2004-en-20220113
Malware Config
Targets
-
-
Target
0f4dd1c10186f8682986732134e6f33f440fbdd999aff471aa82a782e6886819
-
Size
4.1MB
-
MD5
4db5c29f082e78410b0bb79137651ea4
-
SHA1
08a2226f1ac939aa8e5d542ef515f845c2a0fe10
-
SHA256
0f4dd1c10186f8682986732134e6f33f440fbdd999aff471aa82a782e6886819
-
SHA512
df92c5d6e2e6b29aec20f7dba871a43dd5c780cf0ecdbcb5c97cbc3f759871bb354eb4ecb39f749d578a2ebd405e3dd43733a9ea83b67157766076a7a2a63f53
-
Echelon log file
Detects a log file produced by Echelon.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-