General
-
Target
59ebbdf21f80732ee51d8c038fca9306470341d1260751b05626a72a9513a1f0
-
Size
1.6MB
-
Sample
220724-cv9a8abfdn
-
MD5
8ba75de55191a7b284c87450d7ec168e
-
SHA1
e8c1481d0a26713f92ef785b8fd998fdd87198c6
-
SHA256
59ebbdf21f80732ee51d8c038fca9306470341d1260751b05626a72a9513a1f0
-
SHA512
1af991aa7a4ec227ab38df95a0f8a0ef1ab6cd84dd7100718de088e00cd8f4e3d545d3dd4ee40e619f246edf7ec23e6c44b195e57242536c11e22aff6799731d
Static task
static1
Behavioral task
behavioral1
Sample
59ebbdf21f80732ee51d8c038fca9306470341d1260751b05626a72a9513a1f0.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
59ebbdf21f80732ee51d8c038fca9306470341d1260751b05626a72a9513a1f0.exe
Resource
win10v2004-20220722-en
Malware Config
Targets
-
-
Target
59ebbdf21f80732ee51d8c038fca9306470341d1260751b05626a72a9513a1f0
-
Size
1.6MB
-
MD5
8ba75de55191a7b284c87450d7ec168e
-
SHA1
e8c1481d0a26713f92ef785b8fd998fdd87198c6
-
SHA256
59ebbdf21f80732ee51d8c038fca9306470341d1260751b05626a72a9513a1f0
-
SHA512
1af991aa7a4ec227ab38df95a0f8a0ef1ab6cd84dd7100718de088e00cd8f4e3d545d3dd4ee40e619f246edf7ec23e6c44b195e57242536c11e22aff6799731d
Score10/10-
suricata: ET MALWARE W32/Dinwod.Dropper Win32/Xtrat.B CnC Beacon
suricata: ET MALWARE W32/Dinwod.Dropper Win32/Xtrat.B CnC Beacon
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-