General
-
Target
pgp_2.9.51.1128.exe
-
Size
73.7MB
-
Sample
221220-vb54kaad47
-
MD5
d9c9585f6c6d6f530c95b15510a45f15
-
SHA1
71445400b7783b4d791447226265137a6d7bd360
-
SHA256
3953b1c3b702692dfb16484f67ff476c474cb04450ae1d94d61019b9b24f846c
-
SHA512
8f4f5a0cb523c18db4ade7540a3bb9c4f3259cdfe5d51b86568aea038777f208c83ae647eb40bd237c29b66c05510012eed771e8e837b4343c4497d96cec18c0
-
SSDEEP
1572864:UB7f66bfxHnVrD2qA1YmzyZaLthQLmhJILJaUBHS6ICC4k+m:cOIHVrXA1YmzMaLtMwofBypp
Static task
static1
Malware Config
Targets
-
-
Target
pgp_2.9.51.1128.exe
-
Size
73.7MB
-
MD5
d9c9585f6c6d6f530c95b15510a45f15
-
SHA1
71445400b7783b4d791447226265137a6d7bd360
-
SHA256
3953b1c3b702692dfb16484f67ff476c474cb04450ae1d94d61019b9b24f846c
-
SHA512
8f4f5a0cb523c18db4ade7540a3bb9c4f3259cdfe5d51b86568aea038777f208c83ae647eb40bd237c29b66c05510012eed771e8e837b4343c4497d96cec18c0
-
SSDEEP
1572864:UB7f66bfxHnVrD2qA1YmzyZaLthQLmhJILJaUBHS6ICC4k+m:cOIHVrXA1YmzMaLtMwofBypp
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Registers COM server for autorun
-
Sets service image path in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-