General
-
Target
9dc4909066177553d5d91228622b9bf17982a5984d3c32eed9a0ec9f779f2640
-
Size
129KB
-
Sample
220919-bsl78sadh3
-
MD5
af199d351e08a5636642955a71ed8d31
-
SHA1
809cae2e5714ef0dbad6112272775acbe5141d7c
-
SHA256
9dc4909066177553d5d91228622b9bf17982a5984d3c32eed9a0ec9f779f2640
-
SHA512
1b2ca300b6e2df96b880b0a91f106d6f8ce4b1af9d84eec94bd886384bbdbedc22187fb61f9849aa6a0ac16fd63389dfbe14c0ab3d463958171a80c852acffa9
-
SSDEEP
3072:U3FBmZAE9zLEDal8aeytZe0xweAfAfBjnPHEYBd+QAAIYNG:UVsZ59zLE+l8a1meaqBjnPHfKQAAI8G
Static task
static1
Behavioral task
behavioral1
Sample
PHOTO-DEVOCHKA.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
PHOTO-DEVOCHKA.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
PHOTO-DEVOCHKA.exe
-
Size
239KB
-
MD5
70145b98f3b3890a6f5989107b1cfef2
-
SHA1
616bd2cebdf266d468807ff2429546f28485249b
-
SHA256
9d3589d93ecdce7415f84ea14ab5df139fd3af4189833c3f45725885e344f3d3
-
SHA512
234249c5c67621693395629afb64e659139518ca1c45b5280c717a7c3dd3bf9fa0c8f4e67972c7a125a9aa9e08955d93b82da06a72e415aedd676111f4bed0de
-
SSDEEP
6144:CbXE9OiTGfhEClq9cpRM1qcVVx/ZsLJJUq:qU9Xiui++7
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-