General
-
Target
798ee0697f730eea8236cf579e73365b0d36e1ac545ca3f99846bf600d6a1091
-
Size
508KB
-
Sample
221020-h8c3tsbdg3
-
MD5
412013815763a55231435e4f5d494887
-
SHA1
1f17cba6cf2e10e4513a39da0e77eabac98a912c
-
SHA256
798ee0697f730eea8236cf579e73365b0d36e1ac545ca3f99846bf600d6a1091
-
SHA512
77e35da2ae9f9382c8b73262710d4d75fa835182f6177a2ecb2a1f1d2abc7f7590b92c80db5316da3d886701edbab567a1b338dd2b1bb86d33218d75860d247c
-
SSDEEP
6144:73xV7htOfFiktSdWyKYAWFCbW7LYxLk+4MGT+N50cIXv+1coDdkozx3pypmlNH9J:73xxPuFVtSdWJsuWXLGMvxsltRok/Gy
Static task
static1
Behavioral task
behavioral1
Sample
798ee0697f730eea8236cf579e73365b0d36e1ac545ca3f99846bf600d6a1091.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
798ee0697f730eea8236cf579e73365b0d36e1ac545ca3f99846bf600d6a1091.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
798ee0697f730eea8236cf579e73365b0d36e1ac545ca3f99846bf600d6a1091
-
Size
508KB
-
MD5
412013815763a55231435e4f5d494887
-
SHA1
1f17cba6cf2e10e4513a39da0e77eabac98a912c
-
SHA256
798ee0697f730eea8236cf579e73365b0d36e1ac545ca3f99846bf600d6a1091
-
SHA512
77e35da2ae9f9382c8b73262710d4d75fa835182f6177a2ecb2a1f1d2abc7f7590b92c80db5316da3d886701edbab567a1b338dd2b1bb86d33218d75860d247c
-
SSDEEP
6144:73xV7htOfFiktSdWyKYAWFCbW7LYxLk+4MGT+N50cIXv+1coDdkozx3pypmlNH9J:73xxPuFVtSdWJsuWXLGMvxsltRok/Gy
Score10/10-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-