General
-
Target
tmp
-
Size
11.1MB
-
Sample
220409-27t5haeac9
-
MD5
a1188df640d34bda4872725259e7745e
-
SHA1
4a87bacdf63c6dc8dbef467bc735d3165b9051fe
-
SHA256
fd76e8e1f0c3261b50f20fa921b782df82544255d34bc9e21f0bb8beaf31bc12
-
SHA512
353ef676f8743249b9b2923ac9d9f31e6fb6173b9f2c2487e4215bc68c085582998d3c36d736f3b4575799e097f4fc8fc568ac1399bcd49e62fd2ebf1d753f22
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220331-en
Malware Config
Targets
-
-
Target
tmp
-
Size
11.1MB
-
MD5
a1188df640d34bda4872725259e7745e
-
SHA1
4a87bacdf63c6dc8dbef467bc735d3165b9051fe
-
SHA256
fd76e8e1f0c3261b50f20fa921b782df82544255d34bc9e21f0bb8beaf31bc12
-
SHA512
353ef676f8743249b9b2923ac9d9f31e6fb6173b9f2c2487e4215bc68c085582998d3c36d736f3b4575799e097f4fc8fc568ac1399bcd49e62fd2ebf1d753f22
-
LoaderBot executable
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-