General
-
Target
a3ab76b17b04ccbaff41b72ed665bf28e6c5586a4f715e43b1100820acdfd819
-
Size
184KB
-
Sample
221124-vak21abc2z
-
MD5
e1bbdff419119fa9a6de307c4b24f452
-
SHA1
ed572c5b970573a204e7f6b10ef3fc8ee7f92127
-
SHA256
3adf6815c254e63f4b20fba0e03e2bf89ad397c2c096ea20cc7a059e8374d5f8
-
SHA512
84e8410fcd6d18fe8a54f2642cccfe529f4c1109ab20a19aae78afed0a24bd4b8ca3b0a52c90ffaf3692234ce0788a93f510c5692c0ce67fd2ec5016f2bbab07
-
SSDEEP
3072:yK4zLLYxRqK+PWG1j6hkD1YDHLwbyzOMqvWNGlCSQwaxzK1E2Aw4eMil:14zoxAK+7jvCHLnOMqvWtGC8E2AwVMil
Static task
static1
Behavioral task
behavioral1
Sample
a3ab76b17b04ccbaff41b72ed665bf28e6c5586a4f715e43b1100820acdfd819.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a3ab76b17b04ccbaff41b72ed665bf28e6c5586a4f715e43b1100820acdfd819.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
https://www.tvculturaourofino.com.br/assets/js/config_20.ps1
Extracted
amadey
3.50
193.56.146.174/g84kvj4jck/index.php
Targets
-
-
Target
a3ab76b17b04ccbaff41b72ed665bf28e6c5586a4f715e43b1100820acdfd819
-
Size
244KB
-
MD5
c8f046db4ece8e5bc2654c7037267b96
-
SHA1
f21cca0c799bfcb3d9ee3e0b511188a10b0b1327
-
SHA256
a3ab76b17b04ccbaff41b72ed665bf28e6c5586a4f715e43b1100820acdfd819
-
SHA512
bcec736ef727605fbe5a3b26fdaf4d13902e3f59d6c7d54262cf11bc3e1bb6d16b280e96600cca83f1564310bc8ea25aee982f770db6a7c3aaea787648037231
-
SSDEEP
6144:OWzEq1LqpOlwKhQB98/HLnOMOvWtIC8EeSL3WnV:OWzE+upOxhQBq/HLOMfZWV
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-