General
-
Target
c93924eacd92ded4d066fa3da7d11d4a7abd647d92ce556c587202e1014520f9
-
Size
128KB
-
Sample
220919-b1q66aehbp
-
MD5
5043c9a725dd1df0e5539e93752604e9
-
SHA1
c6da95cca39fa4e96f64123e60d3e22b5207a56a
-
SHA256
c93924eacd92ded4d066fa3da7d11d4a7abd647d92ce556c587202e1014520f9
-
SHA512
30e438b3c294d4a582f75f0951d26aca7451912047454104577d5dad14a65bdba09f0aefce357a79fe9013517159acb351176d31b6b72e1bb6fa97d3fa9930ce
-
SSDEEP
3072:pnHXMpxcGxFyhQ0bOqYoxIcEWubRNcPe9d8T2g:1HmGY/o0o+hBbnF9GCg
Static task
static1
Behavioral task
behavioral1
Sample
PHOTO-DEVOCHKA.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
PHOTO-DEVOCHKA.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
PHOTO-DEVOCHKA.exe
-
Size
239KB
-
MD5
cc3e79604fed1f63c7f5f24916fd1d51
-
SHA1
08872ad23e2e9e897d30506d783ed15f4491a25b
-
SHA256
d74b26bea7fd5d0206c63b5251569a57c889debb2cac8e5ad8908a658b8fcd2a
-
SHA512
22c20dc56f46e44e522eac57ded0da8b571e6da2fd37f083509846bb557e513081daddd4d7d9d6cce86d7216ffdfb4ac6e4311e2259dca956d1af5253630e547
-
SSDEEP
3072:QBAp5XhKpN4eOyVTGfhEClj8jTk+0hijkEDboYxU044U/13+Cgw5CKHy:HbXE9OiTGfhEClq9YEXoyDjUEJJUy
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-