General
-
Target
01210da256ed6997f4f510dd5d7fdc78
-
Size
171KB
-
Sample
221011-zlpxjsdgh4
-
MD5
01210da256ed6997f4f510dd5d7fdc78
-
SHA1
5ca9117bddb9225e729b9577c2ecd8a58ba29bfc
-
SHA256
50f4202ec7aa753063dd9242a0e3cbcf23b0551f5ad73296288e7613bc1dd163
-
SHA512
9d91b3bb27bc3ad913876ec1be51f26f60c62c65cd30a9efb8620f70185d48de0d9320af755da2fcec4b83d05076328852a7a1cbaa8d9616c3ab6b74f89b1330
-
SSDEEP
3072:aJNx/F0VGuhBYyIWMOeJhA2yOBGhGKMtIZaXQqrDFmwJibZceHkIox8iZz5uNt:aaBD45JK2yKGhGqZWDFbJiMxTZQNt
Behavioral task
behavioral1
Sample
document.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
document.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
document.exe
-
Size
125KB
-
MD5
5462472ee7f2caee881562566f997429
-
SHA1
54c7664e392117b91fff53e6c863714812a96940
-
SHA256
d4625ff568067e85c2856517ca5c79335b04cb3a84b0ead8c6601d72d0c43558
-
SHA512
f6edf2bf64b28682cc262cfe7476d21ac81311801a8fdcb88ded9912c8a6f51a5c4b1c10e9eb373b0e850a3d743c950f8d0704572f63cad774c4f3e27944bf6a
-
SSDEEP
3072:npDBAKMk0gAN4lgOjCFQ2nf6bdtUNhomcN:nfMPgwIyNSb/Yho
Score8/10-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-