General
-
Target
8a487b244c55599fed414d7a3e448f63a100cd49df9f5464688c9eddd6dbd382
-
Size
29.6MB
-
Sample
220724-vj15ksbfg5
-
MD5
87e9ef77d9eae3a947a8922acf8179d4
-
SHA1
064167fa469d978df5fd2f1963d4bbb94c341e87
-
SHA256
8a487b244c55599fed414d7a3e448f63a100cd49df9f5464688c9eddd6dbd382
-
SHA512
4bbbe4f6fc0cf1fbe1ae30d3f1fe9356b5bdb08ef60dbecca42e32c3d6208b47db9c9087c1542f5f21c1f8a7a0e4951f2e7cc13f4fd336aed2fb3ca99cf487bf
Static task
static1
Behavioral task
behavioral1
Sample
8a487b244c55599fed414d7a3e448f63a100cd49df9f5464688c9eddd6dbd382.exe
Resource
win7-20220718-en
Malware Config
Targets
-
-
Target
8a487b244c55599fed414d7a3e448f63a100cd49df9f5464688c9eddd6dbd382
-
Size
29.6MB
-
MD5
87e9ef77d9eae3a947a8922acf8179d4
-
SHA1
064167fa469d978df5fd2f1963d4bbb94c341e87
-
SHA256
8a487b244c55599fed414d7a3e448f63a100cd49df9f5464688c9eddd6dbd382
-
SHA512
4bbbe4f6fc0cf1fbe1ae30d3f1fe9356b5bdb08ef60dbecca42e32c3d6208b47db9c9087c1542f5f21c1f8a7a0e4951f2e7cc13f4fd336aed2fb3ca99cf487bf
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-