General
-
Target
c40f5c2f012f726e5e8e4b2a81fcd0e76b7aaac71f945da27f7bd658376821c1
-
Size
208KB
-
Sample
221205-m9afjsdc49
-
MD5
c29f0b3d235892c195241551219d01cf
-
SHA1
9f16575d38a8bb17733aa5e7acf5cac2d8f1cf0f
-
SHA256
c40f5c2f012f726e5e8e4b2a81fcd0e76b7aaac71f945da27f7bd658376821c1
-
SHA512
4e45fad57a0c56a88d481ca1de8cc1e87be22de293be4b8fb90a47a868881d1a471a112f9d9858ad0fdbe073aedfedc5e7ced04295842ec4122823d15d815188
-
SSDEEP
3072:nVHgCc4xGvbwcU9KQ2BBAHmaPxvVoqb5ET:OCc4xGxWKQ2Bonxc
Static task
static1
Behavioral task
behavioral1
Sample
c40f5c2f012f726e5e8e4b2a81fcd0e76b7aaac71f945da27f7bd658376821c1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c40f5c2f012f726e5e8e4b2a81fcd0e76b7aaac71f945da27f7bd658376821c1.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Targets
-
-
Target
c40f5c2f012f726e5e8e4b2a81fcd0e76b7aaac71f945da27f7bd658376821c1
-
Size
208KB
-
MD5
c29f0b3d235892c195241551219d01cf
-
SHA1
9f16575d38a8bb17733aa5e7acf5cac2d8f1cf0f
-
SHA256
c40f5c2f012f726e5e8e4b2a81fcd0e76b7aaac71f945da27f7bd658376821c1
-
SHA512
4e45fad57a0c56a88d481ca1de8cc1e87be22de293be4b8fb90a47a868881d1a471a112f9d9858ad0fdbe073aedfedc5e7ced04295842ec4122823d15d815188
-
SSDEEP
3072:nVHgCc4xGvbwcU9KQ2BBAHmaPxvVoqb5ET:OCc4xGxWKQ2Bonxc
Score10/10-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-