General
-
Target
file.exe
-
Size
7.3MB
-
Sample
221123-k6qx1sdg2y
-
MD5
83cce075792f5914f1e2bc7004294e13
-
SHA1
5cb68663c79a606e92bfdca2cbaa559cafb27902
-
SHA256
b6bc391c17a37a17d2be2bcbdfc712602c216af7c2dd5d320f94be5bbc16d7a6
-
SHA512
c3d0b81a4234a98b264ea95a0453d2ff85c1e28e4cb3d43f4b12bc88b4091091c78d955eb94621a3605c0c5a19ea5f540aa4749906539e340e281161358d546f
-
SSDEEP
196608:91ONTzh25zDhTac+XYtC/xUl9q4fZUpmsN0KLJ2:3OXo4otC/g9q4hUpRV2
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
file.exe
-
Size
7.3MB
-
MD5
83cce075792f5914f1e2bc7004294e13
-
SHA1
5cb68663c79a606e92bfdca2cbaa559cafb27902
-
SHA256
b6bc391c17a37a17d2be2bcbdfc712602c216af7c2dd5d320f94be5bbc16d7a6
-
SHA512
c3d0b81a4234a98b264ea95a0453d2ff85c1e28e4cb3d43f4b12bc88b4091091c78d955eb94621a3605c0c5a19ea5f540aa4749906539e340e281161358d546f
-
SSDEEP
196608:91ONTzh25zDhTac+XYtC/xUl9q4fZUpmsN0KLJ2:3OXo4otC/g9q4hUpRV2
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Drops file in System32 directory
-