General
-
Target
a9f5e3e4df4ed31cb7fb95068d4c240b.exe
-
Size
7.8MB
-
Sample
220929-lrnd1sbdcq
-
MD5
a9f5e3e4df4ed31cb7fb95068d4c240b
-
SHA1
f40e523b5fc1703fca65f069baf6cd991a4dcf23
-
SHA256
03aa67a1cb5896c377e33a6d71feedf90088a823e895b35ee651a159a4dc8316
-
SHA512
791f17b8f6e60bc86e637697bfefb4694769d6a43882686bd663d64d37f97c1929d54f4c445803662d02e387280d70be6f870025ac74827e074e8658b6e3ec7a
-
SSDEEP
196608:LIRcbH4jSteTGvDxwhzav1yo31CPwDv3uFZjeg2EeJUO9WLQkDxtw3iFFrS6XOf:LdHsfuDxwZ6v1CPwDv3uFteg2EeJUO9E
Behavioral task
behavioral1
Sample
a9f5e3e4df4ed31cb7fb95068d4c240b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a9f5e3e4df4ed31cb7fb95068d4c240b.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
bitrat
1.38
tcki6mrrcnrt33qy52viv7m64y6hepkv646nnzglrkbgytyt6b2hdrid.onion:80
-
communication_password
827ccb0eea8a706c4c34a16891f84e7b
-
tor_process
dllhost
Targets
-
-
Target
a9f5e3e4df4ed31cb7fb95068d4c240b.exe
-
Size
7.8MB
-
MD5
a9f5e3e4df4ed31cb7fb95068d4c240b
-
SHA1
f40e523b5fc1703fca65f069baf6cd991a4dcf23
-
SHA256
03aa67a1cb5896c377e33a6d71feedf90088a823e895b35ee651a159a4dc8316
-
SHA512
791f17b8f6e60bc86e637697bfefb4694769d6a43882686bd663d64d37f97c1929d54f4c445803662d02e387280d70be6f870025ac74827e074e8658b6e3ec7a
-
SSDEEP
196608:LIRcbH4jSteTGvDxwhzav1yo31CPwDv3uFZjeg2EeJUO9WLQkDxtw3iFFrS6XOf:LdHsfuDxwZ6v1CPwDv3uFteg2EeJUO9E
Score9/10-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Uses Tor communications
Malware can proxy its traffic through Tor for more anonymity.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-