General
-
Target
tmp
-
Size
193KB
-
Sample
221025-m4mhxscdep
-
MD5
34793c6520dcf3c6130dc031fa640c71
-
SHA1
200417a239bb0ac8dedbcd6e74b91ce5401577b4
-
SHA256
5ca468704e7ccb8e1b37c0f7595c54df4e2f4035345b6e442e8bd4e11c58f791
-
SHA512
cc226eee8d1b0dc4841f8a6b5ad07aefb0cca4d30373370930dd44de9869b3551c0e97c2324db7d1427ce2460027b8df3f01b803e4845a644d6b8ca96df3c67e
-
SSDEEP
1536:JPE+R6swvj1q3w45lEdhKzozSFeuiS2FIlKWz0PEziNQKjoe:5EEwvj1aw4IhKzozSFeuiS2FIInwKoe
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
bitrat
1.38
gh9st.mywire.org:5005
-
communication_password
803355ca422bf9b37bc523a750e21842
-
install_dir
svcsvc
-
install_file
svcsvc.exe
-
tor_process
tor
Targets
-
-
Target
tmp
-
Size
193KB
-
MD5
34793c6520dcf3c6130dc031fa640c71
-
SHA1
200417a239bb0ac8dedbcd6e74b91ce5401577b4
-
SHA256
5ca468704e7ccb8e1b37c0f7595c54df4e2f4035345b6e442e8bd4e11c58f791
-
SHA512
cc226eee8d1b0dc4841f8a6b5ad07aefb0cca4d30373370930dd44de9869b3551c0e97c2324db7d1427ce2460027b8df3f01b803e4845a644d6b8ca96df3c67e
-
SSDEEP
1536:JPE+R6swvj1q3w45lEdhKzozSFeuiS2FIlKWz0PEziNQKjoe:5EEwvj1aw4IhKzozSFeuiS2FIInwKoe
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-