General
-
Target
5824595e1c5daaa1f9ba0a7c757853608362368a2d772512e464e6fd9e57369f
-
Size
508KB
-
Sample
221030-kwp8qsdafp
-
MD5
9387a892f5720d43802f485270193153
-
SHA1
611216c87cc7ce52abe7678de7d111b41c111a6e
-
SHA256
5824595e1c5daaa1f9ba0a7c757853608362368a2d772512e464e6fd9e57369f
-
SHA512
5438bce5a951ae89d10c6f1d2f31ad662493a36b235e2f521e99573bc0f9b85747dfabb20bfbae99f7e34ebb9b6966c6880810e789ab1c0ca673f1df80eacf26
-
SSDEEP
6144:x3xV7htOfFiktSdWyKYAWFCbW7LYxLk+4MGT+N50cIXv+1coDdkozx3pypmlNH9J:x3xxPuFVtSdWJsuWXLGMvxsltRok/Gy
Static task
static1
Behavioral task
behavioral1
Sample
5824595e1c5daaa1f9ba0a7c757853608362368a2d772512e464e6fd9e57369f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5824595e1c5daaa1f9ba0a7c757853608362368a2d772512e464e6fd9e57369f.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
5824595e1c5daaa1f9ba0a7c757853608362368a2d772512e464e6fd9e57369f
-
Size
508KB
-
MD5
9387a892f5720d43802f485270193153
-
SHA1
611216c87cc7ce52abe7678de7d111b41c111a6e
-
SHA256
5824595e1c5daaa1f9ba0a7c757853608362368a2d772512e464e6fd9e57369f
-
SHA512
5438bce5a951ae89d10c6f1d2f31ad662493a36b235e2f521e99573bc0f9b85747dfabb20bfbae99f7e34ebb9b6966c6880810e789ab1c0ca673f1df80eacf26
-
SSDEEP
6144:x3xV7htOfFiktSdWyKYAWFCbW7LYxLk+4MGT+N50cIXv+1coDdkozx3pypmlNH9J:x3xxPuFVtSdWJsuWXLGMvxsltRok/Gy
Score10/10-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-