General
-
Target
8b5fb45cf4006aeb513a7a982b402fa695deac8523f3b05c267ae20861fc7280
-
Size
126KB
-
Sample
221129-v3fmzsdc7y
-
MD5
7377a636b68ba0d76f8f17313c762320
-
SHA1
d35161fbc53e59263f0646c70b59b0281c8b93fc
-
SHA256
8b5fb45cf4006aeb513a7a982b402fa695deac8523f3b05c267ae20861fc7280
-
SHA512
ca7a74789efda9f1cc6869bf27c284f2522d97dc9c289ff6211c420d351d851ab7a1e092404513f85202c3a185313b355a6d7a5beba191d226e2fe5ff5c6c2aa
-
SSDEEP
3072:ig/mP4Vi4G/ewSzSS+QVOQQdYmM5eqr6cVpZtu5TmaofJcRm3:idQVFpRzSSFVOQQxMoUppTum
Static task
static1
Behavioral task
behavioral1
Sample
8b5fb45cf4006aeb513a7a982b402fa695deac8523f3b05c267ae20861fc7280.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8b5fb45cf4006aeb513a7a982b402fa695deac8523f3b05c267ae20861fc7280.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
8b5fb45cf4006aeb513a7a982b402fa695deac8523f3b05c267ae20861fc7280
-
Size
126KB
-
MD5
7377a636b68ba0d76f8f17313c762320
-
SHA1
d35161fbc53e59263f0646c70b59b0281c8b93fc
-
SHA256
8b5fb45cf4006aeb513a7a982b402fa695deac8523f3b05c267ae20861fc7280
-
SHA512
ca7a74789efda9f1cc6869bf27c284f2522d97dc9c289ff6211c420d351d851ab7a1e092404513f85202c3a185313b355a6d7a5beba191d226e2fe5ff5c6c2aa
-
SSDEEP
3072:ig/mP4Vi4G/ewSzSS+QVOQQdYmM5eqr6cVpZtu5TmaofJcRm3:idQVFpRzSSFVOQQxMoUppTum
Score10/10-
Modifies visiblity of hidden/system files in Explorer
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Suspicious use of SetThreadContext
-