General
-
Target
8741536120.zip
-
Size
146KB
-
Sample
230112-elvgtafb34
-
MD5
46a4438c3223304a36a725fdaa17bccb
-
SHA1
6deb43461fba69a8a0db7a2f2c834729ceacad62
-
SHA256
e341b03fd298075f595e0245ccc7c785990f22f630b1252a7526567d248f48a5
-
SHA512
3f7c36841c6b3df27ca8a286a50419a946181a137898406cdd42de12c730729dc11db4a5f75c5535572dbc3367a915814cbad6ca1f67a1abcc7bc9b0a7694dae
-
SSDEEP
3072:DwjA+Y9xinzRefOXPzRdZNadhsqKM4dK1xslWuGvj:wufO/zfTpIZSWjvj
Static task
static1
Behavioral task
behavioral1
Sample
2b0c9059feece8475c71fbbde6cf4963132c274cf7ddebafbf2b0a59523c532e.js
Resource
win7-20221111-en
Malware Config
Targets
-
-
Target
2b0c9059feece8475c71fbbde6cf4963132c274cf7ddebafbf2b0a59523c532e
-
Size
271KB
-
MD5
56874c0b5d9fe1a62597098be19113cb
-
SHA1
235b0c6b6ff8c2c667a3aca376e6d09bee039eee
-
SHA256
2b0c9059feece8475c71fbbde6cf4963132c274cf7ddebafbf2b0a59523c532e
-
SHA512
a1039448cf03ca10ef9d05cb3ebf418c45e2083964c9a66f7009beb7b36db41a979618813d0abf6cd03dc38c7709bf1aebe9cd11067afad2358a2145da109f2e
-
SSDEEP
6144:jCPjENIBMqnbvmNETFwauvrb7gOhpFtwWIVyWT:jCPjENI6Cm6zSP9pFKWK
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-