General
-
Target
DG2b3P7hOHbJs2d.exe
-
Size
632KB
-
Sample
221102-e1c63shce9
-
MD5
3cbc50037c3bd685e6704ea938d1f470
-
SHA1
84ab9f936d59b4837821ea59217286caf6466e11
-
SHA256
1464b060a662f7629adb0bd7399a105e13fd6e8570180f7dc43636aad2b53c04
-
SHA512
5c226b552b18e73549b52ffc0687c14e46038e13e4d7c74e18acb2f7e7cb5dbca3b81a46bbc4f5df2ad4f51d0bc53008bae1b4e34d8035a0229d6901a700ab87
-
SSDEEP
12288:qwhuJDNjoEP/lfoHgjpuA3kIO8LayHHxhQvhzps7:xuJJ/oAoA3kN8eyHIs7
Static task
static1
Behavioral task
behavioral1
Sample
DG2b3P7hOHbJs2d.exe
Resource
win7-20220901-en
Malware Config
Extracted
formbook
axe3
nV63ydJMXMf7memspIpnnVLl3Q==
uJ50rs5Y/80AqT79guHh
FcsTFQ1xekTgcal8G0P2ZTQ=
uLWWVJP++ID3dkoB8g==
YyoybGF5Fsa/UH8=
Tk4htwkBBfM5ZA==
QgJ8vN9f+uCdsD79guHh
wmjC9UuSBGyTrY5PAX9t1A==
Sw7JEwOKl576ndxw/A==
BOqs09Ikjej1BN98ZYtVfSi5xQ==
YA5cbH3/4wVAYg==
fRWIvatAXM3+t0X9guHh
FAbZXq/jFuaEq2YCwQh3b2oE
STL+RDTA652/tD/9guHh
zgLNcuX32aFB
WmgwW1UCJ/9Nc0ofkIhVyQ==
jiWgy9ckGh8G+3Q7Rl//NW9ZU7TU
JCoawiBkwAkeJOehkNXRCYnj3A==
WQDFZvang91P
zGrJ4CA2pAhR
QPRTjvEmeNHJHLw4
hEsOq/9JLoNbN7xMFR/pVZbo3A==
v8ye4m6wAfCjtD/9guHh
BBLwmMMaoKz+DbU6
sjgLlNkZ9mir2p0w
RA94vAgqczVm8w+fAX9t1A==
Jc7S9gc/CMtY
d3Q3djg/CMtY
VhqBnq4x3sYMs0L9guHh
n/v36+MW2b27KCv99g==
Vi71NEakLqvP3MqenbNiUC4Ag77W
q2PO39wujdOnAuxj/A==
ZR3lmukghPyiLio14Qr3UzQ=
Zl6HrWMq4wVAYg==
cSLhluP/Ofkn0vf86RH8
9eSoKHzSznZ2E2I=
VS76OTqEeTTUTf3yG0P2ZTQ=
SvRzutQ0LP2xOD65OIlNvcGjf7wR95Ls
k35uD09p0eN9KnU=
lFirx9M0pQpUg0jpvjMpH5S0UrTP
ajKdwrz9WE/8A1dLTCw=
CaL/NoESHca/R3Y0GCQ=
Sghzwgx+c9nHatnaLXxVyQ==
UwF0yGa7uiI=
fjKKobYsUVNpBGc=
OScsLPAH3p9A
kVEWzgFRqnZTJ5QB4w==
wpZxCWOk7NaBlkkWI2dWfSi5xQ==
ijqu3+QWAg603ptOFAq1qfMEc1sXIr/5
zZ4ewkBx7qdG
qI9yt8kQwDhe/2/igMWe3CgL
ANUmYpsVtpbSTJViQ3TjXDY=
nzb3pvZA80MQWk3SbYjyUi8=
HAbPWI0YyvXqYJgf4EEpi3xdT6B13J7x
olY01h1WKvkhBy/y7Q==
dGJK/EiDz5UuvM1W9Q==
em4mQ1fciHK2cC3u/EdFfSi5xQ==
pxC52NcfWmjL+qUw
j3o1VEaAW6jAS1tkRjs=
UAK5/hRmtnmXLXQbf+3sTCs=
v2yzvsMvthMyTA7Gq50ZfSi5xQ==
ehryofUgZVKUMZtJ2vCggmkD
B7kHDAhZxHzJHLw4
nYxx+02TYE35jH5JXYU0fLuPYDw=
succes-digitalmlm.com
Targets
-
-
Target
DG2b3P7hOHbJs2d.exe
-
Size
632KB
-
MD5
3cbc50037c3bd685e6704ea938d1f470
-
SHA1
84ab9f936d59b4837821ea59217286caf6466e11
-
SHA256
1464b060a662f7629adb0bd7399a105e13fd6e8570180f7dc43636aad2b53c04
-
SHA512
5c226b552b18e73549b52ffc0687c14e46038e13e4d7c74e18acb2f7e7cb5dbca3b81a46bbc4f5df2ad4f51d0bc53008bae1b4e34d8035a0229d6901a700ab87
-
SSDEEP
12288:qwhuJDNjoEP/lfoHgjpuA3kIO8LayHHxhQvhzps7:xuJJ/oAoA3kN8eyHIs7
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-