General
-
Target
file.exe
-
Size
1.7MB
-
Sample
221224-2qhp5sag63
-
MD5
16b7484a0d4cfb85f1ee2d60dc193df3
-
SHA1
6deacd8388bf473deab5526786d7e9730fab80d1
-
SHA256
48e9ad246f56cdda1cfaea96413aeb834fe2c43c9f94d7ecdf5e7f2f65094760
-
SHA512
a8795e72ae5d6cc0e2ae90e4c8c57f5e948828fa02490bb83229580400057edaa8515faee6c7a7de0c27843669b06fc74a3c2345e2b46d69ba1800b6ba429ff5
-
SSDEEP
49152:KilBWo7lWw+cBrCh+otdQOju9XQlzo4Zac:KillalhfdzjEQlz1Mc
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Malware Config
Extracted
nymaim
45.139.105.171
85.31.46.167
Targets
-
-
Target
file.exe
-
Size
1.7MB
-
MD5
16b7484a0d4cfb85f1ee2d60dc193df3
-
SHA1
6deacd8388bf473deab5526786d7e9730fab80d1
-
SHA256
48e9ad246f56cdda1cfaea96413aeb834fe2c43c9f94d7ecdf5e7f2f65094760
-
SHA512
a8795e72ae5d6cc0e2ae90e4c8c57f5e948828fa02490bb83229580400057edaa8515faee6c7a7de0c27843669b06fc74a3c2345e2b46d69ba1800b6ba429ff5
-
SSDEEP
49152:KilBWo7lWw+cBrCh+otdQOju9XQlzo4Zac:KillalhfdzjEQlz1Mc
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-