General
-
Target
568e50b97207e7fa8229d4766010b7a844873b75c7ec28b4b0c8f61014df1f1d
-
Size
8.8MB
-
Sample
220725-c47trabecn
-
MD5
ae719a973aef34b8a3fd1b79c95efb1f
-
SHA1
a34c8ea551203ce6632cf2bf2590de563f364ec6
-
SHA256
568e50b97207e7fa8229d4766010b7a844873b75c7ec28b4b0c8f61014df1f1d
-
SHA512
f92ca09e509649839a8c217597f8fc10f1f00a281c1fba5429be744460267c875f02d066cdbf3cc977705c430731741af6aa1c61757347b7a502aac7914d13dc
Static task
static1
Behavioral task
behavioral1
Sample
568e50b97207e7fa8229d4766010b7a844873b75c7ec28b4b0c8f61014df1f1d.exe
Resource
win7-20220715-en
Malware Config
Targets
-
-
Target
568e50b97207e7fa8229d4766010b7a844873b75c7ec28b4b0c8f61014df1f1d
-
Size
8.8MB
-
MD5
ae719a973aef34b8a3fd1b79c95efb1f
-
SHA1
a34c8ea551203ce6632cf2bf2590de563f364ec6
-
SHA256
568e50b97207e7fa8229d4766010b7a844873b75c7ec28b4b0c8f61014df1f1d
-
SHA512
f92ca09e509649839a8c217597f8fc10f1f00a281c1fba5429be744460267c875f02d066cdbf3cc977705c430731741af6aa1c61757347b7a502aac7914d13dc
-
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-