General
-
Target
06e2b6c08a029049a3482e4d299582efbcda7c4c216272ed5c56d448d019aaeb
-
Size
520KB
-
Sample
221020-2e3k6shccq
-
MD5
646669ef10b15d2eac4af06fc1b328d0
-
SHA1
0a166656b4768f09f52c619a776c9ca29f2b3f08
-
SHA256
06e2b6c08a029049a3482e4d299582efbcda7c4c216272ed5c56d448d019aaeb
-
SHA512
6be7d6e203c0f6772da46cb920ba8799d4758c57bdec9a72d11349533dc248b72189d4b2a31991d0656354088b08d77db55f4f76bbc67a4aacb96cf1ed29f424
-
SSDEEP
12288:jL5GA6wigctwxaJOri8KuMhEAF/Lc0CTbkwnj3Zz:H5KwTIzJSPK/hHjXoBj3Zz
Static task
static1
Behavioral task
behavioral1
Sample
06e2b6c08a029049a3482e4d299582efbcda7c4c216272ed5c56d448d019aaeb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
06e2b6c08a029049a3482e4d299582efbcda7c4c216272ed5c56d448d019aaeb.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
06e2b6c08a029049a3482e4d299582efbcda7c4c216272ed5c56d448d019aaeb
-
Size
520KB
-
MD5
646669ef10b15d2eac4af06fc1b328d0
-
SHA1
0a166656b4768f09f52c619a776c9ca29f2b3f08
-
SHA256
06e2b6c08a029049a3482e4d299582efbcda7c4c216272ed5c56d448d019aaeb
-
SHA512
6be7d6e203c0f6772da46cb920ba8799d4758c57bdec9a72d11349533dc248b72189d4b2a31991d0656354088b08d77db55f4f76bbc67a4aacb96cf1ed29f424
-
SSDEEP
12288:jL5GA6wigctwxaJOri8KuMhEAF/Lc0CTbkwnj3Zz:H5KwTIzJSPK/hHjXoBj3Zz
Score10/10-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-