General
-
Target
file
-
Size
7.3MB
-
Sample
221028-e7485sehek
-
MD5
c515485d307962cfe0067711cb2a717f
-
SHA1
5eb3584a2424f613d984d2c99c5e53f741e605e8
-
SHA256
8d7c7bbca31f8638103fcdf0c3ef940ce7797ce7d1f0b4fb124bf528538814c6
-
SHA512
a547bd6d7a113b981696a69b6280d0288b89eb0ab42d9b8a4af0833bdfb75a311f66fa600c9272662675e7b91ed93d5845ffd0d14c41e5fd36e574471905f299
-
SSDEEP
98304:91OSX597+Q0IGLPVjhD5o+0lhqTj8c0+AVGwTq9icf/hOXRNwfn3es63VvJU2tdn:91OO7+qkw+0cjf0pVGw+cKPtKJCtHFS
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Malware Config
Targets
-
-
Target
file
-
Size
7.3MB
-
MD5
c515485d307962cfe0067711cb2a717f
-
SHA1
5eb3584a2424f613d984d2c99c5e53f741e605e8
-
SHA256
8d7c7bbca31f8638103fcdf0c3ef940ce7797ce7d1f0b4fb124bf528538814c6
-
SHA512
a547bd6d7a113b981696a69b6280d0288b89eb0ab42d9b8a4af0833bdfb75a311f66fa600c9272662675e7b91ed93d5845ffd0d14c41e5fd36e574471905f299
-
SSDEEP
98304:91OSX597+Q0IGLPVjhD5o+0lhqTj8c0+AVGwTq9icf/hOXRNwfn3es63VvJU2tdn:91OO7+qkw+0cjf0pVGw+cKPtKJCtHFS
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-