General
-
Target
unlocker-1-9-2.zip
-
Size
1014KB
-
Sample
220903-tk815shdhl
-
MD5
e560af917b573be4b3e16877c7e2667d
-
SHA1
9cd65f3b5e024b09cc4d0c33458c4dd6f1c6c65d
-
SHA256
57bdfb9bde70c7384c25564f8c878afd8cdacfc199bd0c5711d41bc2f884c5b3
-
SHA512
e1492a67fd785b87d787078af7c437d06d5d3402895e38ad13617576e1b201ef6045b9491b7471b7d10a8e2e2e6a43588f0fc8cdfaed773ffc25280b01b10c28
-
SSDEEP
24576:QjmJe+QYoTPb7D1x0IMo+OjHyQrGlCrG+ou5afmTsA:Qjms+Q7f70IM9o/rGhhFsj
Static task
static1
Behavioral task
behavioral1
Sample
Unlocker1.9.2.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\Program Files\Unlocker\README.TXT
http://unlocker.emptyloop.com
Targets
-
-
Target
Unlocker1.9.2.exe
-
Size
1.0MB
-
MD5
1e02d6aa4a199448719113ae3926afb2
-
SHA1
f1eff6451ced129c0e5c0a510955f234a01158a0
-
SHA256
fb6b1171776554a808c62f4045f5167603f70bf7611de64311ece0624b365397
-
SHA512
7d0f1416beb8c141ee992fe594111042309690c00741dff8f9f31b4652ed6a96b57532780e3169391440076d7ace63966fab526a076adcdc7f7ab389b4d0ff98
-
SSDEEP
24576:eLMeYSiGTpTLDxxwqQcqOj5eyHox6ZGmAuXE7ZBlbT:+PbVvwqQpoLHontDrlbT
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Executes dropped EXE
-
Registers COM server for autorun
-
Sets service image path in registry
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-