General
-
Target
file.exe
-
Size
7.2MB
-
Sample
221123-pk26dabf39
-
MD5
28ceb8d72ff0934b39e779a3b6f1c514
-
SHA1
c4731a619c179da43cc1f059e8693a88e9891bf4
-
SHA256
1d260f0670b9c7a24763540bbeadf520d7edd342bcbe9d08d2352cade2502720
-
SHA512
8966a7163f3af92671631558a3bfb6b353778f008334e0346d594a43cb07b9eb2742f80812a8a54cf863e77a9f755e0577e4a4e0c7d0b0ceb873fdbfe2fb0a1f
-
SSDEEP
98304:91OFjm0/1juHbR5cyCJUMlcCOAndwmVXUBNECTb3z9Ob0sSmPFSVlCfdD+0Wvad8:91OFjx9jORHCuiUedHRKuNJNdRX0uXgJ
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Malware Config
Targets
-
-
Target
file.exe
-
Size
7.2MB
-
MD5
28ceb8d72ff0934b39e779a3b6f1c514
-
SHA1
c4731a619c179da43cc1f059e8693a88e9891bf4
-
SHA256
1d260f0670b9c7a24763540bbeadf520d7edd342bcbe9d08d2352cade2502720
-
SHA512
8966a7163f3af92671631558a3bfb6b353778f008334e0346d594a43cb07b9eb2742f80812a8a54cf863e77a9f755e0577e4a4e0c7d0b0ceb873fdbfe2fb0a1f
-
SSDEEP
98304:91OFjm0/1juHbR5cyCJUMlcCOAndwmVXUBNECTb3z9Ob0sSmPFSVlCfdD+0Wvad8:91OFjx9jORHCuiUedHRKuNJNdRX0uXgJ
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-