General
-
Target
019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd
-
Size
653KB
-
Sample
221126-b77sgsgb3z
-
MD5
522853fc7173f637ae423e558c983ecd
-
SHA1
fc622564e9b8d2d39197969fd857f85188246b50
-
SHA256
019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd
-
SHA512
676a780af9b5e1b1c1fee6abe990d112f17a541a3dc2a1ea71680e4be56ee6a3155628741bba148841f2760629de0f386f4c6038c52a6772ea0b303d240489dc
-
SSDEEP
12288:ULmMOBCmXo7OCj+5MlaGBKwFJo6SYrfZfHoA+ybn:ULmxonVj+5MLBK6PrpHZrn
Static task
static1
Behavioral task
behavioral1
Sample
019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd
-
Size
653KB
-
MD5
522853fc7173f637ae423e558c983ecd
-
SHA1
fc622564e9b8d2d39197969fd857f85188246b50
-
SHA256
019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd
-
SHA512
676a780af9b5e1b1c1fee6abe990d112f17a541a3dc2a1ea71680e4be56ee6a3155628741bba148841f2760629de0f386f4c6038c52a6772ea0b303d240489dc
-
SSDEEP
12288:ULmMOBCmXo7OCj+5MlaGBKwFJo6SYrfZfHoA+ybn:ULmxonVj+5MLBK6PrpHZrn
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-