General
-
Target
5709c8dd011ed0f84fb268125debc9d89db690d6e263276f5e241b97a025d941
-
Size
284KB
-
Sample
221003-1wxwkshcf2
-
MD5
078c149ef8006f7d42bb81789dc162e7
-
SHA1
dc7863578871b192b1a8fae0bdc06f9f555d47dd
-
SHA256
5709c8dd011ed0f84fb268125debc9d89db690d6e263276f5e241b97a025d941
-
SHA512
90261677dac75b130a14b7028505425ea9d36db4382e04ee035f618b16f91e0919df38d38cb604b50798930a0cf9bfd1603a6057eddefbf396555d59156802db
-
SSDEEP
3072:mSQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lC:mPA6wxmuJspr2l
Static task
static1
Behavioral task
behavioral1
Sample
5709c8dd011ed0f84fb268125debc9d89db690d6e263276f5e241b97a025d941.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5709c8dd011ed0f84fb268125debc9d89db690d6e263276f5e241b97a025d941.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
5709c8dd011ed0f84fb268125debc9d89db690d6e263276f5e241b97a025d941
-
Size
284KB
-
MD5
078c149ef8006f7d42bb81789dc162e7
-
SHA1
dc7863578871b192b1a8fae0bdc06f9f555d47dd
-
SHA256
5709c8dd011ed0f84fb268125debc9d89db690d6e263276f5e241b97a025d941
-
SHA512
90261677dac75b130a14b7028505425ea9d36db4382e04ee035f618b16f91e0919df38d38cb604b50798930a0cf9bfd1603a6057eddefbf396555d59156802db
-
SSDEEP
3072:mSQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lC:mPA6wxmuJspr2l
Score8/10-
Adds policy Run key to start application
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-