General
-
Target
ae56110fc0998855480413d89dd9b42438e647568b1fd9946dda30e404e215d1
-
Size
119KB
-
Sample
221202-v8x48adc61
-
MD5
caac36b97ae352101fc7492d91f45dc5
-
SHA1
eeb7aa20a15579eeb422103245874e400285d6b6
-
SHA256
ae56110fc0998855480413d89dd9b42438e647568b1fd9946dda30e404e215d1
-
SHA512
513c7891383a1f79917b87ccf25ea6f28cf3b9dd32cf7d1cbf982735bbc73a8a8c69260e2b388398bb412914a35fa1b3cb11b63f6e6465774d60b3adf3f652c5
-
SSDEEP
3072:enmH0QTs66Kz2gCU8uoLXHJOVL6mBH4mcLO:enQzZBlMA9lH4mcLO
Static task
static1
Behavioral task
behavioral1
Sample
PHOTO-DEVOCHKA.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
PHOTO-DEVOCHKA.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
PHOTO-DEVOCHKA.exe
-
Size
237KB
-
MD5
ba2bf7358006651b7f089cf5dd96cd32
-
SHA1
939048fee823c35f23c22aed5dceca97a8be0c85
-
SHA256
21f6371b68404f168d5861e5fde1170eda93d81d86a86cc765bcd30d732b78bc
-
SHA512
c715e72a63150192bbb8a70302512540d7ada89bc08ee50bf7e40eb8d25664d63ac7c3fc9d5dbc145d062e729a06dafe8e67649f0095f426ac8b4ea3156101f3
-
SSDEEP
3072:6BAp5XhKpN4eOyVTGfhEClj8jTk+0h5Y2AGeSw+Cgw5CKHS:JbXE9OiTGfhEClq9AY2AGeGJJUS
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-