General
-
Target
cd48383befb4dce49fb855d64f500ca1.exe
-
Size
1.2MB
-
Sample
221116-wr35kscc65
-
MD5
cd48383befb4dce49fb855d64f500ca1
-
SHA1
af506733441826dbd789c972a2d627038c0c80af
-
SHA256
040aa152e739826874a268f4ffb8be80dd256e7817cdb2c25329d25a5264671e
-
SHA512
193aa7aae1f12f70b692e4bf5ac7ce8846256da76cbbdc68c1a9fe5746931cb92196ea1505ed49aab81bd45616eb7811940fbd29a83383ed95dd5f0336a9183f
-
SSDEEP
24576:jolGO8/6YpXCGf+SK/ftRnMh9+bTLWdaVom4v7FF:j0GL6YpZmSat5LWdNhF
Static task
static1
Behavioral task
behavioral1
Sample
cd48383befb4dce49fb855d64f500ca1.exe
Resource
win7-20220812-en
Malware Config
Extracted
systembc
89.22.225.242:4193
195.2.93.22:4193
Targets
-
-
Target
cd48383befb4dce49fb855d64f500ca1.exe
-
Size
1.2MB
-
MD5
cd48383befb4dce49fb855d64f500ca1
-
SHA1
af506733441826dbd789c972a2d627038c0c80af
-
SHA256
040aa152e739826874a268f4ffb8be80dd256e7817cdb2c25329d25a5264671e
-
SHA512
193aa7aae1f12f70b692e4bf5ac7ce8846256da76cbbdc68c1a9fe5746931cb92196ea1505ed49aab81bd45616eb7811940fbd29a83383ed95dd5f0336a9183f
-
SSDEEP
24576:jolGO8/6YpXCGf+SK/ftRnMh9+bTLWdaVom4v7FF:j0GL6YpZmSat5LWdNhF
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-