General
-
Target
DHL Express Duty Charge, AWB & BL.exe
-
Size
580KB
-
Sample
221123-m34e2sah4y
-
MD5
53f6cb13cf941ca18bc398d32f845579
-
SHA1
a09d0166e26b59e01d8f9314c98534adcb6de340
-
SHA256
12748aea84778652c1b2fef43117bdb42de3061f4a4376927ca27154cce42013
-
SHA512
c272cc3432ad0ed6946fb6c95a9e76842f605b66096bfc86203245176e460494ed670f718110468c9c71957dcd29d66006b7738e40e951cb06f9c762234c2494
-
SSDEEP
12288:isDRL2aOfokSwTh/TCu3SCfn1YD9wj0lmbPOFh7HuTO:DJOfo9+8VCfn89QPOB
Static task
static1
Behavioral task
behavioral1
Sample
DHL Express Duty Charge, AWB & BL.exe
Resource
win7-20221111-en
Malware Config
Extracted
formbook
h8t0
pX0T7fJ5SmBsroaYtF/qyNlKtSA=
S2NpcYsZ0sMKKsWw
InTDrCxX1GVhp7fzmK8=
mH5Ax6r2GyAh
GYKFkKD2GyAh
TyWptjZgzlzNV0Y2PtM85dlKtSA=
D/V0extZ3I/PVr6mCqGNazBB
xik8B2uLuILxdg==
oohXUF/7tHGxQs42SvIo+64=
7W/2B7CoqOEfY3WqCw==
SKW3c0DvmA991EE=
dx1jYxAG+T9YaOxctM5OqQ==
uBwqzYUt3KHNKEI1Oq/2tV4UUQ==
HkhDv2iluILxdg==
O8ca/3Z0p/xD0dc9jwgr2g6oorw/DA==
CdVTZwxFv2LSRyckeO1Uvg==
UaO+if0kiQ0HHe29lwaEIv+morw/DA==
wB5RfRm6wFunIVY=
UvpBQ+Ucf97/PRGJm4v8
s86lipNDSIu9D/IqkUIhHGUMTA==
MsRSZ8glT5UKKsWw
h+TjzsBQNWee7mmJm4v8
JjNB9VJy8avXKy9m9K6NiDZW
1ThP7JAh7wBq7W3VvtlLGNL9Fv48AM+M
0aVuX1cDu/xf61uJm4v8
59GTc3bxjw991EE=
W7WtpGP2GyAh
GYB02C9luILxdg==
q40QFKzH8T1/w+nP6pMVtg==
Z7nJeUbOQf9BkvBZPF2NiDZW
44cU1d8CXg991EE=
JAfUubVdNhJAjKHgeO1Uvg==
xUfPxDpbyFResMP3wXIKsQ==
4JULrng5OYFbY3WqCw==
KMER7l9088Ugtkq6oMFOJ6keJowM
iONATQAEF46CrtiSnbc=
vFvxA5jDJbUnY3WqCw==
q38T4TU9Q5IKKsWw
fhWcnTxemRoeRqjqvxoa9q4=
JQOBewE1tTozcr0eJp0n5tlKtSA=
3UVIQET29fnwYEAkeO1Uvg==
9seJT6Kuq/IdWyuHKtDnJ9lKtSA=
pghXMgi5b0eRHoq7udwIhgnrSR8J
wSifzGL2GyAh
lSOrnMgrnSOIyPbtyTSemhW/PQlzQz4SQw==
vyUjBfOerfsvdkub/pgyAUZldz4+iJ0=
R62vVKK/P8mzvp/JW8//6Kg=
YkQfLFf5tIrGUulRNVGpMNlKtSA=
Mzc6PVj8w5reeNiSnbc=
r7WMaU0DPLW3yprIKM1A3VzzNQoD
NZCnac7wYhJEnq6TpVzolYY7HXA8AM+M
W8HXkFLpqLIijuVML5GjfuuUUSY=
ZDrJfbiM/nzocA==
0zU4R1/plYvyftiSnbc=
94UYxZIyJyMSKniJm4v8
gU0iIzrckQ991EE=
QQng4fB6LyuRB2RKtXKUUwzzNQoD
+pAWCZSf8LT6fNiSnbc=
s0eZgvUFfQ/085X01r8=
Duapf9rg2fjtMce5XL0PinUiUw==
htza8RasicBGlXOjAw==
yjNpAg+kzdzxbg==
imDm9Z+97WTWNPtKn0jlwv42orw/DA==
2rB3JWz2xsgKKsWw
shura-asia.org
Targets
-
-
Target
DHL Express Duty Charge, AWB & BL.exe
-
Size
580KB
-
MD5
53f6cb13cf941ca18bc398d32f845579
-
SHA1
a09d0166e26b59e01d8f9314c98534adcb6de340
-
SHA256
12748aea84778652c1b2fef43117bdb42de3061f4a4376927ca27154cce42013
-
SHA512
c272cc3432ad0ed6946fb6c95a9e76842f605b66096bfc86203245176e460494ed670f718110468c9c71957dcd29d66006b7738e40e951cb06f9c762234c2494
-
SSDEEP
12288:isDRL2aOfokSwTh/TCu3SCfn1YD9wj0lmbPOFh7HuTO:DJOfo9+8VCfn89QPOB
-
Checks QEMU agent file
Checks presence of QEMU agent, possibly to detect virtualization.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-