General
-
Target
0ed015da8ed67abfc890ba016803bab62273f06be5454a0dc9c2d7a0a5ba3176
-
Size
1.6MB
-
Sample
220604-v97eaahce9
-
MD5
45e68e5bc35e6b0ac6b49dc0fd7717b4
-
SHA1
4c932687c07008e2e1d08cae540fd71fde403add
-
SHA256
0ed015da8ed67abfc890ba016803bab62273f06be5454a0dc9c2d7a0a5ba3176
-
SHA512
aa1c0651aaa1bd8e3b6073e5feb8338203a5d4e1922ba96240576441c94dbf17ee18b9d8e0d134931a5754b81f76df740766e31dfd49a55df601c88c82732d18
Static task
static1
Behavioral task
behavioral1
Sample
0ed015da8ed67abfc890ba016803bab62273f06be5454a0dc9c2d7a0a5ba3176.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0ed015da8ed67abfc890ba016803bab62273f06be5454a0dc9c2d7a0a5ba3176.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
0ed015da8ed67abfc890ba016803bab62273f06be5454a0dc9c2d7a0a5ba3176
-
Size
1.6MB
-
MD5
45e68e5bc35e6b0ac6b49dc0fd7717b4
-
SHA1
4c932687c07008e2e1d08cae540fd71fde403add
-
SHA256
0ed015da8ed67abfc890ba016803bab62273f06be5454a0dc9c2d7a0a5ba3176
-
SHA512
aa1c0651aaa1bd8e3b6073e5feb8338203a5d4e1922ba96240576441c94dbf17ee18b9d8e0d134931a5754b81f76df740766e31dfd49a55df601c88c82732d18
Score10/10-
suricata: ET MALWARE W32/Dinwod.Dropper Win32/Xtrat.B CnC Beacon
suricata: ET MALWARE W32/Dinwod.Dropper Win32/Xtrat.B CnC Beacon
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-