General
-
Target
3D1672C7A51602F091B622285FBCCE4AEEC4522D428A1A2179B2F1033C94B3E3
-
Size
269KB
-
Sample
221123-r2v5haab94
-
MD5
e6cf453714f173ec38a48cdde5a7368c
-
SHA1
5598dc5a4e09b119ea7d8e2ed02b126f4c869b36
-
SHA256
3d1672c7a51602f091b622285fbcce4aeec4522d428a1a2179b2f1033c94b3e3
-
SHA512
80a5e704a857fe8d18d673bbfdf8e94ede9ff3f1d4a4edb4c34bd26d3adeaf922edd192a744e70bbb5a308295fb9138823ca47f2682910699a8750eea15d063c
-
SSDEEP
6144:XSnatkeXNHhPZt6EMw+XYcFGujqdcK7po/zSLXCW:inatRNpZt7Mw+ocF1GIzYXf
Static task
static1
Behavioral task
behavioral1
Sample
Product Specification.exe
Resource
win7-20220812-en
Malware Config
Extracted
formbook
xhnq
kkL8Pu8x+4S6wfoCcvftOA==
496LxjKjebwp3Q==
ZNpe1artufAiEvfm
4CIcGQGlfZxOWk0WfU+wmLwHYNU=
nCqrPAt3AVekKygjamfKlLwHYNU=
t3ppAKZhQHeDNIODv4HKmLwHYNU=
ELBzK0V6QboxkHETQPeEni+H
BrZstrXumvReu6Q5bGAp1idBRcBqdzIWBw==
yNispwXS2wJJ
WzKfqGFL2TuyZbWJfP922LwHYNU=
qOfvZB3ikBBe
02Ae6pxfJKIwxGUzLw==
MK5YMCnhqBH9LYpSyZFZ
P5ZeKBadM4fFMvxSyZFZ
2BhbGIIr3/bytfHx
1awWI9/MRYX7aEHQTgLHJQ==
n61fuJeFBWTZohooVyqYhrwHYNU=
DIoQj5nLfMg27S77/sOCFuzOkA==
X5tPEguDocp8lfoHcvftOA==
MK5fKQV570dBgQSTAfs=
ve6fcwtLCICqqOkCcvftOA==
SkDDyshAuxb91wSTAfs=
mQSCDqkHoPbnQri1Ng4DXxI=
DpAhqlDS2wJJ
SOCGNuadb5zcWaRk4/DFJQ==
vB6cJLtoLVU9gwSTAfs=
RB+OjpUSluTytfHx
b9KJ0+HcXrIWihcYUBFsMA==
ygr9SPtw90mRHf9SyZFZ
CROhn5JhFaBL3NzXI9pxJgU=
DXntgjzwqjvfhfD0LcLXrzaF
THRZ5/El8HAbnHQxcvftOA==
jMyLV0W0XIRBZ18joN6Eni+H
PYyCmD6KVtgAAjsN+ra4Sd3Hkg==
hN5uMNXMgoLzww==
250rIBzBkrgoxGUzLw==
Sbk1usPAfpJWct/yJw==
pBeM944cz0k=
9TL/x3csCUs8gwSTAfs=
IknvqYJLTp0n3g==
d7mIVSbfla68bbyFsCmSVz8Gmg==
P4tve5Ifj8e5DINSyZFZ
uEn6746SgoLzww==
ppIXLM4S4FSbLpFSyZFZ
L3sV47stshAN89mkF9pxJgU=
FvS6+dX+1fTytfHx
fxCIBqYJpe7ytfHx
9u2wv89/VXPpRSLiG/KEni+H
gyfntptFA4S80QSTAfs=
5Xb/fpOaVnL2yQ==
fjIVqkr5yvjytfHx
YuqQaVfUPsI9xGUzLw==
GE3zw7ghqihaLGphOA==
ZhjQC9HHgoLzww==
qZ5BlZWbHYcAWzXMAPkA1B0J/Qei8A==
CJAXjpWYLbEteb3FAvi/Sd3Hkg==
RK8qs1TS2wJJ
Ipej9tmWZbBlWTI=
Hy/Bw8FkM8rlxGUzLw==
qWojXi0bmNlH/kkSJdpxJgU=
3VbdUyYIoB6lb2jvItpxJgU=
+K54woVi83zytfHx
7s0h7vGuefz82QSTAfs=
kZ4uOZ0Z7DdjPSs=
402l.com
Targets
-
-
Target
Product Specification.exe
-
Size
281KB
-
MD5
49b374a64015666e9ae51070c7df038e
-
SHA1
5cc61425c317ff5256811adc6ecd9e224ee7c3d4
-
SHA256
2d0bf404b71b81df2a8256b7adb927dfac1ed504c968f0c7e07dd3fea4213bb1
-
SHA512
c437cead3a461959791ff0fff852f3e5df34294af52a427fe0c2e81391a97f5fd25e97f0bddae292230775f49b1dd39cb4f1a873c876cb0f13aeb3a15e8f171d
-
SSDEEP
6144:MEa0NTHageXNHhxZt6EMw+XYWFGuZqdcKI+cCzSLXRt:XTHa9NPZt7Mw+oWF/GoLCzYXX
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-