General
-
Target
e03661c8e6ea8931d21b0a9083d82643be1fcc46b334981350bc3b3e121f3e8d
-
Size
520KB
-
Sample
221003-de1vksdbe8
-
MD5
6163405b8e0cfde811a7d9597e6621f0
-
SHA1
4ddc9671350549fe590b519142eed3ec08365f9a
-
SHA256
e03661c8e6ea8931d21b0a9083d82643be1fcc46b334981350bc3b3e121f3e8d
-
SHA512
41d51899bb263f85154a6847c72e696048c6cbc1592c19b6996bd5f99f7efc5236ea30eb2ae4f10dcb690b4bba5a21b4ebaf2668753ee6ae72ccb8b420602c29
-
SSDEEP
12288:jn5GA6wigctwxaJOri8KuMhEAF/Lc0CTbkwnj3Zz:b5KwTIzJSPK/hHjXoBj3Zz
Static task
static1
Behavioral task
behavioral1
Sample
e03661c8e6ea8931d21b0a9083d82643be1fcc46b334981350bc3b3e121f3e8d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e03661c8e6ea8931d21b0a9083d82643be1fcc46b334981350bc3b3e121f3e8d.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
e03661c8e6ea8931d21b0a9083d82643be1fcc46b334981350bc3b3e121f3e8d
-
Size
520KB
-
MD5
6163405b8e0cfde811a7d9597e6621f0
-
SHA1
4ddc9671350549fe590b519142eed3ec08365f9a
-
SHA256
e03661c8e6ea8931d21b0a9083d82643be1fcc46b334981350bc3b3e121f3e8d
-
SHA512
41d51899bb263f85154a6847c72e696048c6cbc1592c19b6996bd5f99f7efc5236ea30eb2ae4f10dcb690b4bba5a21b4ebaf2668753ee6ae72ccb8b420602c29
-
SSDEEP
12288:jn5GA6wigctwxaJOri8KuMhEAF/Lc0CTbkwnj3Zz:b5KwTIzJSPK/hHjXoBj3Zz
Score10/10-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-