General
-
Target
db64e72464fd9ef07542fbee1e6d078b10f83576a16c3d2152ecdf86941d3573
-
Size
6.0MB
-
Sample
221204-jl6masdf3z
-
MD5
964624aa3e3ddaa872bdf4675d32a9e2
-
SHA1
677241dfaa8836a1a46b6b2fd586440be8fbae57
-
SHA256
db64e72464fd9ef07542fbee1e6d078b10f83576a16c3d2152ecdf86941d3573
-
SHA512
870e12ba1866dcd2ffb702c688b843be51b61996fbc918959164706056e77451a007e751d28d631d68a38cdf79f492699708883fdd93ef4282f2b97b50aa3b21
-
SSDEEP
98304:5rFcMe2yH+ayUM1miGmHuzvl+TlIJKZlIefRTzpPB0NY/ajSmdVwCFn:tKMet+at4miGmHpTSJYXtzpPBJ/ajXB
Static task
static1
Behavioral task
behavioral1
Sample
db64e72464fd9ef07542fbee1e6d078b10f83576a16c3d2152ecdf86941d3573.exe
Resource
win7-20220901-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.drivehq.com - Port:
21 - Username:
demonzun
Targets
-
-
Target
db64e72464fd9ef07542fbee1e6d078b10f83576a16c3d2152ecdf86941d3573
-
Size
6.0MB
-
MD5
964624aa3e3ddaa872bdf4675d32a9e2
-
SHA1
677241dfaa8836a1a46b6b2fd586440be8fbae57
-
SHA256
db64e72464fd9ef07542fbee1e6d078b10f83576a16c3d2152ecdf86941d3573
-
SHA512
870e12ba1866dcd2ffb702c688b843be51b61996fbc918959164706056e77451a007e751d28d631d68a38cdf79f492699708883fdd93ef4282f2b97b50aa3b21
-
SSDEEP
98304:5rFcMe2yH+ayUM1miGmHuzvl+TlIJKZlIefRTzpPB0NY/ajSmdVwCFn:tKMet+at4miGmHpTSJYXtzpPBJ/ajXB
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-