General
-
Target
6ea7282cfda868d1b326507d037bea446c1fd822934a733a7c2b698f691725e0
-
Size
520KB
-
Sample
221106-sndtqsgge2
-
MD5
0ca709a867b55364d547ddc773e3f350
-
SHA1
0069b28673672ce1917673fe85ce8afae508d897
-
SHA256
6ea7282cfda868d1b326507d037bea446c1fd822934a733a7c2b698f691725e0
-
SHA512
836322c55d03131055f22a70762fec072b718dc2765575c29ea29c5156349139b64724436df46c587ea1a30ec2173bdd9bb5dfa2dddace36db654847c3a4b663
-
SSDEEP
12288:ju5GA6wigctwxaJOri8KuMhEAF/Lc0CTbkwnj3Zz:S5KwTIzJSPK/hHjXoBj3Zz
Static task
static1
Behavioral task
behavioral1
Sample
6ea7282cfda868d1b326507d037bea446c1fd822934a733a7c2b698f691725e0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6ea7282cfda868d1b326507d037bea446c1fd822934a733a7c2b698f691725e0.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
6ea7282cfda868d1b326507d037bea446c1fd822934a733a7c2b698f691725e0
-
Size
520KB
-
MD5
0ca709a867b55364d547ddc773e3f350
-
SHA1
0069b28673672ce1917673fe85ce8afae508d897
-
SHA256
6ea7282cfda868d1b326507d037bea446c1fd822934a733a7c2b698f691725e0
-
SHA512
836322c55d03131055f22a70762fec072b718dc2765575c29ea29c5156349139b64724436df46c587ea1a30ec2173bdd9bb5dfa2dddace36db654847c3a4b663
-
SSDEEP
12288:ju5GA6wigctwxaJOri8KuMhEAF/Lc0CTbkwnj3Zz:S5KwTIzJSPK/hHjXoBj3Zz
Score10/10-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-