General
-
Target
2172025a472a7e5684005faf5aee5bd0dcc41309a6068709c90fa0e2281ae2f4
-
Size
556KB
-
Sample
221028-v949xsggb5
-
MD5
0e29137467655e2e135494b18ceb89a7
-
SHA1
36873a35d5ada97c49c7390ac04dd7dcc0823329
-
SHA256
2172025a472a7e5684005faf5aee5bd0dcc41309a6068709c90fa0e2281ae2f4
-
SHA512
5d6f9e942598329411e258366869e75f25f7e07e14bc648867bd9af2e57dc4e704c52778317077e5cca233e43b080577a7eca21c09185a66e616c71906a92aab
-
SSDEEP
12288:Z7Lo8Rs90X41cnOOWB2KpyYK4BVqZDx2mpmHPW9GROsI8w:Z7L1yMgcnOds44Fp2PWUDI8
Static task
static1
Behavioral task
behavioral1
Sample
2172025a472a7e5684005faf5aee5bd0dcc41309a6068709c90fa0e2281ae2f4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2172025a472a7e5684005faf5aee5bd0dcc41309a6068709c90fa0e2281ae2f4.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
2172025a472a7e5684005faf5aee5bd0dcc41309a6068709c90fa0e2281ae2f4
-
Size
556KB
-
MD5
0e29137467655e2e135494b18ceb89a7
-
SHA1
36873a35d5ada97c49c7390ac04dd7dcc0823329
-
SHA256
2172025a472a7e5684005faf5aee5bd0dcc41309a6068709c90fa0e2281ae2f4
-
SHA512
5d6f9e942598329411e258366869e75f25f7e07e14bc648867bd9af2e57dc4e704c52778317077e5cca233e43b080577a7eca21c09185a66e616c71906a92aab
-
SSDEEP
12288:Z7Lo8Rs90X41cnOOWB2KpyYK4BVqZDx2mpmHPW9GROsI8w:Z7L1yMgcnOds44Fp2PWUDI8
Score10/10-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-