General
-
Target
tmp
-
Size
37KB
-
Sample
221217-y5g6dahe55
-
MD5
cb1ba70812eda56152bd1e2186acabe9
-
SHA1
0416d3296a3e4ad7b3746d01f79c13f1166a6a3f
-
SHA256
f730e83049c7fe81f6e4765ab91efbb7a373751d51fdafe697a4977dc7c1ea11
-
SHA512
6d05ae0e84173f43a551f8554ef9dbd6a2a0da2686c4ed065afd4b898e2638ecd755978a2fc55a6a92bbb717915e9537ef73c8819209f662fe2083fd873b29af
-
SSDEEP
768:QoYoqEeq17XpwE3sKfkCbJokUP/W19qpBo1P2:92s71D6xP/W7qmP2
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
C:\FILE RECOVERY.txt
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion/mallox/privateSignin
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion
Extracted
C:\FILE RECOVERY.txt
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion/mallox/privateSignin
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion
Targets
-
-
Target
tmp
-
Size
37KB
-
MD5
cb1ba70812eda56152bd1e2186acabe9
-
SHA1
0416d3296a3e4ad7b3746d01f79c13f1166a6a3f
-
SHA256
f730e83049c7fe81f6e4765ab91efbb7a373751d51fdafe697a4977dc7c1ea11
-
SHA512
6d05ae0e84173f43a551f8554ef9dbd6a2a0da2686c4ed065afd4b898e2638ecd755978a2fc55a6a92bbb717915e9537ef73c8819209f662fe2083fd873b29af
-
SSDEEP
768:QoYoqEeq17XpwE3sKfkCbJokUP/W19qpBo1P2:92s71D6xP/W7qmP2
Score10/10-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-