General
-
Target
f15a04700bdbd82234a324ea9d0eb5c2
-
Size
7.8MB
-
Sample
220823-n6bpwahbh7
-
MD5
f15a04700bdbd82234a324ea9d0eb5c2
-
SHA1
8ea6e761e8b24a6eb23e0b59a59e7afda10e0053
-
SHA256
6225733d751641ed48c78e200c761961aa6f01947e5c7fef79729fb7a1b3795b
-
SHA512
5de8361b7c010f5f8b67db80b0856182531250e15833c2443184ee72bbc7f040200ca9f74a5c897da97cd9f73fd47e17714b32ed5dff6d460c0bed2a3501cab1
-
SSDEEP
196608:oIRcbH4jSteTGvjxwhzav1yo31CPwDv3uFZjeg2EeJUO9WLQkDxtw3iFFrS6XOf:odHsfujxwZ6v1CPwDv3uFteg2EeJUO9E
Behavioral task
behavioral1
Sample
f15a04700bdbd82234a324ea9d0eb5c2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f15a04700bdbd82234a324ea9d0eb5c2.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
bitrat
1.38
otx66i7lyk5mdfdu55a7v2qkcsq2apyjferoizgzw5yblmf74uvkrkqd.onion:80
-
communication_password
3f09fec94c92a2a8544c7854ec598a24
-
install_dir
Install path
-
install_file
Install name
-
tor_process
tor
Targets
-
-
Target
f15a04700bdbd82234a324ea9d0eb5c2
-
Size
7.8MB
-
MD5
f15a04700bdbd82234a324ea9d0eb5c2
-
SHA1
8ea6e761e8b24a6eb23e0b59a59e7afda10e0053
-
SHA256
6225733d751641ed48c78e200c761961aa6f01947e5c7fef79729fb7a1b3795b
-
SHA512
5de8361b7c010f5f8b67db80b0856182531250e15833c2443184ee72bbc7f040200ca9f74a5c897da97cd9f73fd47e17714b32ed5dff6d460c0bed2a3501cab1
-
SSDEEP
196608:oIRcbH4jSteTGvjxwhzav1yo31CPwDv3uFZjeg2EeJUO9WLQkDxtw3iFFrS6XOf:odHsfujxwZ6v1CPwDv3uFteg2EeJUO9E
Score10/10-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-