General
-
Target
bd03f44b8747391b016c0b6a8727cc366102857986c17a6a6f59ad3a84abc9ef
-
Size
86KB
-
Sample
221107-y6xx8agbe3
-
MD5
0bc8e5f86b279bc1ec66409f210e5ae3
-
SHA1
ee55b4183ae05ca73f8e91a4f0dcf8b5d52cefa1
-
SHA256
bd03f44b8747391b016c0b6a8727cc366102857986c17a6a6f59ad3a84abc9ef
-
SHA512
9444981342c297de1a7861d48aba78085e6b91fc14fb88ebc99be3da93c61435a2b54a81753264874b0f0385d3a3ea57b7945c761aba471155a474b1c76e73f9
-
SSDEEP
1536:NllaEWUB//y/R8ZABR/fllbckTrmGfCTijLphJ2C9C59KuWt:oUB3y/cUR/LYkTrbWijLF1w5zWt
Static task
static1
Behavioral task
behavioral1
Sample
bd03f44b8747391b016c0b6a8727cc366102857986c17a6a6f59ad3a84abc9ef.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bd03f44b8747391b016c0b6a8727cc366102857986c17a6a6f59ad3a84abc9ef.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
bd03f44b8747391b016c0b6a8727cc366102857986c17a6a6f59ad3a84abc9ef
-
Size
86KB
-
MD5
0bc8e5f86b279bc1ec66409f210e5ae3
-
SHA1
ee55b4183ae05ca73f8e91a4f0dcf8b5d52cefa1
-
SHA256
bd03f44b8747391b016c0b6a8727cc366102857986c17a6a6f59ad3a84abc9ef
-
SHA512
9444981342c297de1a7861d48aba78085e6b91fc14fb88ebc99be3da93c61435a2b54a81753264874b0f0385d3a3ea57b7945c761aba471155a474b1c76e73f9
-
SSDEEP
1536:NllaEWUB//y/R8ZABR/fllbckTrmGfCTijLphJ2C9C59KuWt:oUB3y/cUR/LYkTrbWijLF1w5zWt
Score10/10-
Modifies visiblity of hidden/system files in Explorer
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Suspicious use of SetThreadContext
-