General
-
Target
57360b25c7f267dc03d16e6bacf6ba648ab393a9969ebd7c4656edb414e1b8bc
-
Size
256KB
-
Sample
221123-z6psaaee98
-
MD5
1da400056c5108658743949a4a863284
-
SHA1
3cd4442020be2e4594164d7c2af36f1d10e8465b
-
SHA256
57360b25c7f267dc03d16e6bacf6ba648ab393a9969ebd7c4656edb414e1b8bc
-
SHA512
9fdbaa9ec8472e41cdb47fd3a75dc3e0dd8b1bde81ece27a531d5c61d36b86c5fcc1842963e458f3d394ee917e825d32eac68e113662b266ac5ddab9c56b433d
-
SSDEEP
6144:c7RPGkG+2O01WQY4MyTjGMT8N00lFKgOLpE4dFbbxGo:c7RekGLO0CyvGMT8N00GlDM
Static task
static1
Behavioral task
behavioral1
Sample
57360b25c7f267dc03d16e6bacf6ba648ab393a9969ebd7c4656edb414e1b8bc.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
57360b25c7f267dc03d16e6bacf6ba648ab393a9969ebd7c4656edb414e1b8bc.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
57360b25c7f267dc03d16e6bacf6ba648ab393a9969ebd7c4656edb414e1b8bc
-
Size
256KB
-
MD5
1da400056c5108658743949a4a863284
-
SHA1
3cd4442020be2e4594164d7c2af36f1d10e8465b
-
SHA256
57360b25c7f267dc03d16e6bacf6ba648ab393a9969ebd7c4656edb414e1b8bc
-
SHA512
9fdbaa9ec8472e41cdb47fd3a75dc3e0dd8b1bde81ece27a531d5c61d36b86c5fcc1842963e458f3d394ee917e825d32eac68e113662b266ac5ddab9c56b433d
-
SSDEEP
6144:c7RPGkG+2O01WQY4MyTjGMT8N00lFKgOLpE4dFbbxGo:c7RekGLO0CyvGMT8N00GlDM
Score10/10-
Modifies visiblity of hidden/system files in Explorer
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-