General
-
Target
Scan AR441 SHEETS.exe
-
Size
483KB
-
Sample
221123-p476qsda48
-
MD5
ae6e5c25ef61b57b0474c12fb74b9880
-
SHA1
feb3c0ced829b8ab62d94267f4ec0578ede5e58a
-
SHA256
31d9c25d965fa6de72c0c376159c19da21bc5dcd579bc038b2134d19b1ca9ab2
-
SHA512
0fc452ea778b13aa467a4e44e6d98896d319c32e147067fbf48ee86842b672b10cf8e571f9292fef429aea009c899851313c625b333b93edb2607c75853a2bcb
-
SSDEEP
12288:Wtm2gHDUkrFwT3OSwmucvWwfmRbBT3lhQvaMmgG9l:6gIIFwT3OcucUNwas
Static task
static1
Behavioral task
behavioral1
Sample
Scan AR441 SHEETS.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Scan AR441 SHEETS.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
formbook
pfgc
hBGNx7LOg1/1V9He6Lr1odiL8A==
JUtMWPUI+jYE3h2D0VXJrkViyWlklw==
9Onb+iNxE//TbnVsww==
+zlULMoiC8l+8Tev2wK6Xpt3qkQ2
vv/ckxYzTsV3W3KwMKjDf1rK+A==
fiNtn8AUmEDcSGooP0OzpNX0
Vo+DIT5uE/PEbnVsww==
JzMzXJDojoBk5EcxFTKznOD+
hxRyvNTzW6eTCQ==
/CcTv23E93dcQXf9RUb+
n6ODTfEg31QE9F0=
V9k3j8Pew4FJqasspfOBQNk=
mq+vfSOVMzCmhwN1wUeUUME41Pw=
1frRhiXBVRSqDTLo46vXXNc=
WP9xcxRKdPLGtCeZ8VMcCsA=
dIBJ53JHoTO5
tlakzPSKiYl02hJYqJQdC8I=
EiPtnEnwhz/bMaJp+a0cj8g=
s7mOSbbN8GbPM3von61MR8E41Pw=
HFhN1/bX7Umz
S4VoSwNOfLM4L2aYAVMcCsA=
5xsGdOJ+/oscfQX9RUb+
bPtbgYoUBQeWb+WL0stwuQ==
4fHkCCmtxNbi3VU=
Uotm8ESrxdbi3VU=
JUMx3n3nmROl
6gXnjk71mlTvZX79RUb+
2hIAe6jOQLqzDw==
Nbfy14/A41tDNHX9RUb+
eYVVL98GL6dsb5XUQig2rg==
zea5cfkdQLFeUoGzJaXro/UmmeU=
DyX1pyBOiQO43g1/HSv2
J70PEbrO6m9QLWv9RUb+
GcYeOqjhCEZSLVu4dW8=
SUIwry+AogLOAhja
0nnnEhHApy377Fc=
nyW4DkehU0j+aX79RUb+
nZ1zFMgRLWpJm0I=
z82zJj+J4uSWBmCp2w==
Y1c6sCK3JKM4rkJAQig2rg==
KjMFh52jPCo/YYyiXmY=
gzaEu7PcR4NovU0=
kqN5MqcelQGt2wjI
c4pnBSffi8OuFw==
IXwd/cDdR4NovU0=
Rb0eKuMF9ifCqjPgjy9IvPeszoLd8L/C
bYeLRN4wXuuF6E81DSqznOD+
J1lL3QIji8OuFw==
IC0PuVz8nVfcQ3H9RUb+
/6sEZo6iHL6Nx/XC
ynrW6geniBLUsQfMtsCopqTd8Kzdi+GSVg==
vEfbHR87i8OuFw==
4xL6c/BfWg+k
+5XtPaCwpshXPbw6lzqUUME41Pw=
GcopQG8TLHVNO3X9RUb+
j5CHIUJgCwndd4WAy1gj75Lp
6439Q1x5ICnhm+YuzA==
R9BLcxJklb0xGV1ZoCIfovEtouU=
RLc6fZg0TpE1GTBc8l32qw==
oCWW2tkRiAfo0y2X9VEOicPelfQ=
+AnXbwluHc/KbnVsww==
J1JA99dAsSQKAiAoGyn2
9Y/XASV2RIYkGEgwQig2rg==
Nm6KY/9fWg+k
wooklabel.store
Targets
-
-
Target
Scan AR441 SHEETS.exe
-
Size
483KB
-
MD5
ae6e5c25ef61b57b0474c12fb74b9880
-
SHA1
feb3c0ced829b8ab62d94267f4ec0578ede5e58a
-
SHA256
31d9c25d965fa6de72c0c376159c19da21bc5dcd579bc038b2134d19b1ca9ab2
-
SHA512
0fc452ea778b13aa467a4e44e6d98896d319c32e147067fbf48ee86842b672b10cf8e571f9292fef429aea009c899851313c625b333b93edb2607c75853a2bcb
-
SSDEEP
12288:Wtm2gHDUkrFwT3OSwmucvWwfmRbBT3lhQvaMmgG9l:6gIIFwT3OcucUNwas
-
Checks QEMU agent file
Checks presence of QEMU agent, possibly to detect virtualization.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-