General
-
Target
XovLauncher.exe
-
Size
9KB
-
Sample
221107-ksqebsbbaj
-
MD5
abd3e1d69b885d3f98afd426b2157a8f
-
SHA1
e6543de93758224c0b5c7ab70e3dd0b0725a8484
-
SHA256
8d5bbc1df6891d4e6d87702068fedfdccf2533e0fe6648aa12e62766cc20cb54
-
SHA512
ac2a1863cc7b7633d120ee973b27a312e8047e5bb653a3b97207dbbe74d4ee3e4f9291e0a392b46f176cde748c1ac2f8d94936ca0fb19e133afbd269b6c6fd64
-
SSDEEP
192:5xyMD99zXjmYqLDv9lqvk+9xwcvkcFNtUqkAuY7vkadYdR:5xvD99jGLDv90k+9xTk6Nt/zuYDkeoR
Static task
static1
Behavioral task
behavioral1
Sample
XovLauncher.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
XovLauncher.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
XovLauncher.exe
-
Size
9KB
-
MD5
abd3e1d69b885d3f98afd426b2157a8f
-
SHA1
e6543de93758224c0b5c7ab70e3dd0b0725a8484
-
SHA256
8d5bbc1df6891d4e6d87702068fedfdccf2533e0fe6648aa12e62766cc20cb54
-
SHA512
ac2a1863cc7b7633d120ee973b27a312e8047e5bb653a3b97207dbbe74d4ee3e4f9291e0a392b46f176cde748c1ac2f8d94936ca0fb19e133afbd269b6c6fd64
-
SSDEEP
192:5xyMD99zXjmYqLDv9lqvk+9xwcvkcFNtUqkAuY7vkadYdR:5xvD99jGLDv90k+9xTk6Nt/zuYDkeoR
Score8/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-