General
-
Target
05c1db899e9fa8d5680ae0d7b235b1d9f0c8d70622dacca16dab257a18662137
-
Size
65KB
-
Sample
220527-vc31ladda5
-
MD5
eb15e7dcfca71d24302f712f93df60ad
-
SHA1
48515c1ec1feaf5c6d8cee57144b4c4ef32c8e8d
-
SHA256
05c1db899e9fa8d5680ae0d7b235b1d9f0c8d70622dacca16dab257a18662137
-
SHA512
2da3d0b0540ea50e043b83da91044da49822ef0dad416b29195ad221fd236b98a1195253eac61112c2a69dcfe2e00059ca0e6655713d02eaff5989c76f32dda1
Static task
static1
Behavioral task
behavioral1
Sample
05c1db899e9fa8d5680ae0d7b235b1d9f0c8d70622dacca16dab257a18662137.exe
Resource
win7-20220414-en
Malware Config
Extracted
http://nicoslag.ru/asdfg.exe
http://nicoslag.ru/asdfg.exe
Extracted
arkei
Default
Targets
-
-
Target
05c1db899e9fa8d5680ae0d7b235b1d9f0c8d70622dacca16dab257a18662137
-
Size
65KB
-
MD5
eb15e7dcfca71d24302f712f93df60ad
-
SHA1
48515c1ec1feaf5c6d8cee57144b4c4ef32c8e8d
-
SHA256
05c1db899e9fa8d5680ae0d7b235b1d9f0c8d70622dacca16dab257a18662137
-
SHA512
2da3d0b0540ea50e043b83da91044da49822ef0dad416b29195ad221fd236b98a1195253eac61112c2a69dcfe2e00059ca0e6655713d02eaff5989c76f32dda1
-
suricata: ET MALWARE Base64 Encoded Stealer Config from Server - APPDATA or USERPROFILE Environment Variable M4
suricata: ET MALWARE Base64 Encoded Stealer Config from Server - APPDATA or USERPROFILE Environment Variable M4
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-