General
-
Target
fe3868de44639e4db971bc2600cdcd55c09e1500a1e9a3cb7a8d22f1867c795c.bin
-
Size
3.7MB
-
Sample
220714-kqngysfafl
-
MD5
2006a4de01e8d2330d684c44b824ed52
-
SHA1
21aafc6bf52e3765b9538d5de5eacbe3fbb7d4f8
-
SHA256
fe3868de44639e4db971bc2600cdcd55c09e1500a1e9a3cb7a8d22f1867c795c
-
SHA512
be80a27e54891d8350116daeb3cc652e5071c904cf22bbad1b45931a3f432ac1b9e4b9f0dca2dd481eb485e19a28e9bcaeb6b1448f2b4abb50de3a90eee54a01
Static task
static1
Behavioral task
behavioral1
Sample
fe3868de44639e4db971bc2600cdcd55c09e1500a1e9a3cb7a8d22f1867c795c.exe
Resource
win7-20220414-en
Malware Config
Extracted
vulturi
http://154.53.33.203:5050/gate
-
c2_encryption_key
testkey
-
c2_user
root
Targets
-
-
Target
fe3868de44639e4db971bc2600cdcd55c09e1500a1e9a3cb7a8d22f1867c795c.bin
-
Size
3.7MB
-
MD5
2006a4de01e8d2330d684c44b824ed52
-
SHA1
21aafc6bf52e3765b9538d5de5eacbe3fbb7d4f8
-
SHA256
fe3868de44639e4db971bc2600cdcd55c09e1500a1e9a3cb7a8d22f1867c795c
-
SHA512
be80a27e54891d8350116daeb3cc652e5071c904cf22bbad1b45931a3f432ac1b9e4b9f0dca2dd481eb485e19a28e9bcaeb6b1448f2b4abb50de3a90eee54a01
-
Vulturi payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Suspicious use of SetThreadContext
-