General
-
Target
tmpg7ppnopp
-
Size
3.2MB
-
Sample
220927-lqreaaebhq
-
MD5
6a04f501aeefa67f49287873ca57ca84
-
SHA1
213c407002adbf92d2a62a15c4d28b51f62e3e64
-
SHA256
9eee24de7c7be7ede485a66d1e21cfcd17abcd05a3b33b34892b58bb2298f4a9
-
SHA512
981ad9a3e270b10d39d6189cf4c20437ffd5994cec6437dfb035f88091b872abc644f7ecd01abe6a31ef1cd1aad88161e35ecd5ac15fbf8321e2f6acff6a43b8
-
SSDEEP
49152:moBa6TTJk3Uj2F8HXhnFvt4FF9j09MEE2AxRvZrNbptkorPVTNP3s/iuReN:Ro6vJvSurvSvYTAxZZHjsiu8N
Static task
static1
Behavioral task
behavioral1
Sample
tmpg7ppnopp.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
tmpg7ppnopp.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
bitrat
1.38
pedroleonta822.con-ip.com:5020
-
communication_password
202cb962ac59075b964b07152d234b70
-
tor_process
tor
Targets
-
-
Target
tmpg7ppnopp
-
Size
3.2MB
-
MD5
6a04f501aeefa67f49287873ca57ca84
-
SHA1
213c407002adbf92d2a62a15c4d28b51f62e3e64
-
SHA256
9eee24de7c7be7ede485a66d1e21cfcd17abcd05a3b33b34892b58bb2298f4a9
-
SHA512
981ad9a3e270b10d39d6189cf4c20437ffd5994cec6437dfb035f88091b872abc644f7ecd01abe6a31ef1cd1aad88161e35ecd5ac15fbf8321e2f6acff6a43b8
-
SSDEEP
49152:moBa6TTJk3Uj2F8HXhnFvt4FF9j09MEE2AxRvZrNbptkorPVTNP3s/iuReN:Ro6vJvSurvSvYTAxZZHjsiu8N
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-