General
-
Target
c9fb1fbe39972d7ba2c127a126e9c22117a306470e75bd0a3a9c480f18ae7237
-
Size
268KB
-
Sample
221202-behynaha72
-
MD5
79ca88d619518f16322ac422702c1343
-
SHA1
49bd4ba82e8a756beda318a810aa88e1551dfc37
-
SHA256
c9fb1fbe39972d7ba2c127a126e9c22117a306470e75bd0a3a9c480f18ae7237
-
SHA512
cc0c32ad5dda91360865530ef6d952367f64319ec26f05b96c2ce4d22c1e810cb658a737b85933e483399aa71e693aeadbd06b4d8f9b3f5c265cb48d2832e123
-
SSDEEP
3072:EVHgCc4xGvbwcU9KQ2BBAHmaPxNVoOb5Eu:RCc4xGxWKQ2Bonxh
Static task
static1
Behavioral task
behavioral1
Sample
c9fb1fbe39972d7ba2c127a126e9c22117a306470e75bd0a3a9c480f18ae7237.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c9fb1fbe39972d7ba2c127a126e9c22117a306470e75bd0a3a9c480f18ae7237.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Extracted
Protocol: ftp- Host:
ftp.byethost12.com - Port:
21 - Username:
b12_8082975 - Password:
951753zx
Targets
-
-
Target
c9fb1fbe39972d7ba2c127a126e9c22117a306470e75bd0a3a9c480f18ae7237
-
Size
268KB
-
MD5
79ca88d619518f16322ac422702c1343
-
SHA1
49bd4ba82e8a756beda318a810aa88e1551dfc37
-
SHA256
c9fb1fbe39972d7ba2c127a126e9c22117a306470e75bd0a3a9c480f18ae7237
-
SHA512
cc0c32ad5dda91360865530ef6d952367f64319ec26f05b96c2ce4d22c1e810cb658a737b85933e483399aa71e693aeadbd06b4d8f9b3f5c265cb48d2832e123
-
SSDEEP
3072:EVHgCc4xGvbwcU9KQ2BBAHmaPxNVoOb5Eu:RCc4xGxWKQ2Bonxh
Score10/10-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-