General
-
Target
c9a0eff6f1ad3e0060c3454c58da21b2fdf6bf7a6f9290eb0e7b1df25eac8e24
-
Size
209KB
-
Sample
221204-lndemsbf9s
-
MD5
cb2dfa596bd16023462059c08021788d
-
SHA1
eb336af31ff94d77268b5f6c2ddb32bd2c613e9f
-
SHA256
c9a0eff6f1ad3e0060c3454c58da21b2fdf6bf7a6f9290eb0e7b1df25eac8e24
-
SHA512
d82af7d189937904a7d79487e2579af3e2786f5e8afb4f4eed599ee1ade68f3f3a371232f4b4b3c9c352c6641b6628b1cc560f161bd8a84c026f6741b4fee039
-
SSDEEP
3072:WChJgYMm4xf9cU9KQ2BxA59SPMGOojn2lF:GYMm4xiWKQ2BiCM/
Static task
static1
Behavioral task
behavioral1
Sample
c9a0eff6f1ad3e0060c3454c58da21b2fdf6bf7a6f9290eb0e7b1df25eac8e24.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c9a0eff6f1ad3e0060c3454c58da21b2fdf6bf7a6f9290eb0e7b1df25eac8e24.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Targets
-
-
Target
c9a0eff6f1ad3e0060c3454c58da21b2fdf6bf7a6f9290eb0e7b1df25eac8e24
-
Size
209KB
-
MD5
cb2dfa596bd16023462059c08021788d
-
SHA1
eb336af31ff94d77268b5f6c2ddb32bd2c613e9f
-
SHA256
c9a0eff6f1ad3e0060c3454c58da21b2fdf6bf7a6f9290eb0e7b1df25eac8e24
-
SHA512
d82af7d189937904a7d79487e2579af3e2786f5e8afb4f4eed599ee1ade68f3f3a371232f4b4b3c9c352c6641b6628b1cc560f161bd8a84c026f6741b4fee039
-
SSDEEP
3072:WChJgYMm4xf9cU9KQ2BxA59SPMGOojn2lF:GYMm4xiWKQ2BiCM/
Score10/10-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-