General
-
Target
e4647c785b93725187f48397253cae9b41c9db81ee066f7799b1d51afca6838e
-
Size
119KB
-
Sample
221129-v21a1aad75
-
MD5
0cd2948c94bea0bb99dbf1facbd99792
-
SHA1
69dd9a7e0483935e55a91c2aadd957d7cba9c78b
-
SHA256
e4647c785b93725187f48397253cae9b41c9db81ee066f7799b1d51afca6838e
-
SHA512
cbf05721cead8257de54dd77326e76faf53cee1f32b172db35d0e5fb0fbf78a301d63782ee96610056265a6a0c030b6615fd21781871c493f1477399fbfce7fd
-
SSDEEP
1536:cn/bwDHHUQTsX36h0ST44dpapQBCUo95MoqwWWkPufZZT2mRzzDwYUStr/J2kuGn:cnmH0QTs66Kz2gCU8uoLfxh/07lEH
Static task
static1
Behavioral task
behavioral1
Sample
PHOTO-DEVOCHKA.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
PHOTO-DEVOCHKA.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
PHOTO-DEVOCHKA.exe
-
Size
237KB
-
MD5
eb1cdf3bad0448d18b4f6da3be5bc4e5
-
SHA1
fe3066247cc047ec212fbeebe98a356e54e0e482
-
SHA256
5f981881ae277155751b5b657b71760b44f3c5757d5bbd32913445a28ed579cc
-
SHA512
a939d9d7a47a927a104c29d09be6b7371dddc63b16586e103b17f7a0488b989f3dd117ab5e8851ca2bff40f4fc1b22321fbf9bea73381d7211a29d43996ad591
-
SSDEEP
3072:6BAp5XhKpN4eOyVTGfhEClj8jTk+0h5Y2AGeSU+Cgw5CKHS:JbXE9OiTGfhEClq9AY2AGeoJJUS
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-