General
-
Target
6月@15.exe
-
Size
450KB
-
Sample
220706-rgn6fsffd7
-
MD5
e35990ef75577eea3cd4595a7298db05
-
SHA1
4bd3ab8b02a4c3b870b57b60027cb6621640360a
-
SHA256
cc0a3df4ed14b3d4e9344f945189df4c4a560c3c0a67f353260c66b0266a19ec
-
SHA512
84bbccc7d1b1de8bf2998585a91a80aa9d50122e6a2117162d70c26eefb82918e3d252b2cfc25ad169d2747ef994bf04f58f90b9b6134ba108167067220e1082
Static task
static1
Behavioral task
behavioral1
Sample
6月@15.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
6月@15.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
6月@15.exe
-
Size
450KB
-
MD5
e35990ef75577eea3cd4595a7298db05
-
SHA1
4bd3ab8b02a4c3b870b57b60027cb6621640360a
-
SHA256
cc0a3df4ed14b3d4e9344f945189df4c4a560c3c0a67f353260c66b0266a19ec
-
SHA512
84bbccc7d1b1de8bf2998585a91a80aa9d50122e6a2117162d70c26eefb82918e3d252b2cfc25ad169d2747ef994bf04f58f90b9b6134ba108167067220e1082
Score8/10-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-