General
-
Target
f0adeff4bc938e7578b0a8fcce10caf00cb46d309a98d800bd5a82003b2198b7
-
Size
99KB
-
Sample
220919-wbk9tsahg3
-
MD5
c33fb77ba48b299329bee26dee3e218f
-
SHA1
0c78a8a6237c63738eed5b5c00930e3b9c9c11e4
-
SHA256
f0adeff4bc938e7578b0a8fcce10caf00cb46d309a98d800bd5a82003b2198b7
-
SHA512
7a2cdf3a4e7d6950e5ac741e908bd1b499fe9b47161db879c708132009f3d50b67490cdb5d1d3aa1785539c6ac142b4af607d2671721fa2ef0fc0febb1c8676e
-
SSDEEP
3072:q47excGxFLPkH9SnbZDa0fkU37D7mEHjeZRewlL:q+eGYtPk0Z+0fBD2RewlL
Static task
static1
Behavioral task
behavioral1
Sample
PHOTO-DEVOCHKA.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
PHOTO-DEVOCHKA.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
PHOTO-DEVOCHKA.exe
-
Size
149KB
-
MD5
f017add0319b24def517032c3b93b06f
-
SHA1
69aa7ec014e3cab55ef2f4df20e70d6856e76927
-
SHA256
1fccd0adbb781ba2f3c9dd5340069470ea79410cb57d8d206b29dd011dd5e46e
-
SHA512
9cc4a05e4b253f3f285154b82fc8945a1e00a3607feacbd20973480732a6fed210987ce42e32d24f74d582775f1ca045774054f3e4aae5c7b9ca5d41e2950d9c
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hiY9ruInWRewlt:AbXE9OiTGfhEClq98PWRewlt
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-