General
-
Target
aa6589284e293185b299ab1925aed8712a35bd40b1a7c4e3b54bccad8247bebf
-
Size
284KB
-
Sample
221001-yjz43aecbm
-
MD5
652f1d03ec3ac30fe796c586f6297580
-
SHA1
86b8c0bd2a1f976886d9302ba94f2149db7c4682
-
SHA256
aa6589284e293185b299ab1925aed8712a35bd40b1a7c4e3b54bccad8247bebf
-
SHA512
3807113ac0b42f19390bf351ba50097364615677a47b54b7af0b65b963f4697dcbbf1d547344e8fcc74d4ac66fe5fbd330039e462b5ef4b3caef2e056039ceb5
-
SSDEEP
3072:mSQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lC:mPA6wxmuJspr2l
Static task
static1
Behavioral task
behavioral1
Sample
aa6589284e293185b299ab1925aed8712a35bd40b1a7c4e3b54bccad8247bebf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aa6589284e293185b299ab1925aed8712a35bd40b1a7c4e3b54bccad8247bebf.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
aa6589284e293185b299ab1925aed8712a35bd40b1a7c4e3b54bccad8247bebf
-
Size
284KB
-
MD5
652f1d03ec3ac30fe796c586f6297580
-
SHA1
86b8c0bd2a1f976886d9302ba94f2149db7c4682
-
SHA256
aa6589284e293185b299ab1925aed8712a35bd40b1a7c4e3b54bccad8247bebf
-
SHA512
3807113ac0b42f19390bf351ba50097364615677a47b54b7af0b65b963f4697dcbbf1d547344e8fcc74d4ac66fe5fbd330039e462b5ef4b3caef2e056039ceb5
-
SSDEEP
3072:mSQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lC:mPA6wxmuJspr2l
Score8/10-
Adds policy Run key to start application
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-