General
-
Target
899c762b00ff907f6d153106fc91df27780dd14a9f7a4db6dd63a6beb02e29cc
-
Size
129KB
-
Sample
220919-bssp1sadh9
-
MD5
c4e4336f9e687f1d34c2de6d96708091
-
SHA1
223cba3cc1c3b957404d350e99a42ab84d0eecb3
-
SHA256
899c762b00ff907f6d153106fc91df27780dd14a9f7a4db6dd63a6beb02e29cc
-
SHA512
b66bd8e17e85a0afa51e82013f9c63d2795936aeebc1275843585cfd82f5d21f5783dfefae7ed6ef12260ca318a9cd56fce1b2b03638ffd129382c30b487d453
-
SSDEEP
3072:N3FBmZAE9zLEDal8aeytZe0xweAfAfBjnPHEYBd+QAAIYNH:NVsZ59zLE+l8a1meaqBjnPHfKQAAI8H
Static task
static1
Behavioral task
behavioral1
Sample
PHOTO-DEVOCHKA.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
PHOTO-DEVOCHKA.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
PHOTO-DEVOCHKA.exe
-
Size
239KB
-
MD5
70145b98f3b3890a6f5989107b1cfef2
-
SHA1
616bd2cebdf266d468807ff2429546f28485249b
-
SHA256
9d3589d93ecdce7415f84ea14ab5df139fd3af4189833c3f45725885e344f3d3
-
SHA512
234249c5c67621693395629afb64e659139518ca1c45b5280c717a7c3dd3bf9fa0c8f4e67972c7a125a9aa9e08955d93b82da06a72e415aedd676111f4bed0de
-
SSDEEP
6144:CbXE9OiTGfhEClq9cpRM1qcVVx/ZsLJJUq:qU9Xiui++7
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-