General
-
Target
c405e1abbd997b267c3f66d1183efe4d40b0ddedda88f83146a262fa3a4c644c
-
Size
124KB
-
Sample
220919-bkmh2aeagk
-
MD5
498c26ae0de09d33594fb9fe2b527c77
-
SHA1
f848cdad4789be9160e30614247e388198c1e6b7
-
SHA256
c405e1abbd997b267c3f66d1183efe4d40b0ddedda88f83146a262fa3a4c644c
-
SHA512
d5e35748fd80b9b846ec2c493a1e19038ee9ca505e2c54e4aeb7dce9a4cba794a50f927d364379864551dbbad03eb666791eba621992d3964a379e36733640e7
-
SSDEEP
3072:enHXMpxcGxFyhQ0bOqYJrC06GdkEfj+BcB9AHDMVTCjtm:aHmGY/o0JrV6GJ+q98DMxsm
Static task
static1
Behavioral task
behavioral1
Sample
PHOTO-DEVOCHKA.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
PHOTO-DEVOCHKA.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
PHOTO-DEVOCHKA.exe
-
Size
239KB
-
MD5
6839c4c1e533bdef312fa9501b7cd622
-
SHA1
0a4a288e686a64c0d926e5d5c7ddd46ec7eeeaa1
-
SHA256
5b40e9c2a5bbd190d09eade750b1ce1a48887f6822a3e8a4cf3f927c38088982
-
SHA512
d0cafe97a7ab0444424d88d6fddbe2bb0bc9d33abaaeec21101388982d40728d5114d30d1d9b3f7b5d0ea77cbfc6f8067256d4cd7613d14de74ccd196a1dd954
-
SSDEEP
3072:MBAp5XhKpN4eOyVTGfhEClj8jTk+0hYoO/MgjqEWBz+Cgw5CKHy:7bXE9OiTGfhEClq95/MgXJJUy
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-