General
-
Target
payload.bat
-
Size
48KB
-
Sample
230131-vwe3wahc28
-
MD5
83875df1ddf8a47531e763f5bc140691
-
SHA1
8d1bc0c5bceedd229b8faaf6542779726188b145
-
SHA256
a15f29572a149a04d45b8c01daa047ec9f517077a507f8d53ac9b8a8ceed4a34
-
SHA512
e19c020f4fe1922a4adef3dd50851514a99852b7eefa9b74e6e954f941349a60589e171a618423d0029e8d3e8568536026a1012586a74daa4d19a1ebabb701a7
-
SSDEEP
768:xZZOUUP++sgCpDgSE2WPENq+qrD/PESqitk3Spn1eqy1nUNamt:m+qCNgNgqdj1qitvl
Static task
static1
Behavioral task
behavioral1
Sample
payload.bat
Resource
win7-20221111-en
Malware Config
Targets
-
-
Target
payload.bat
-
Size
48KB
-
MD5
83875df1ddf8a47531e763f5bc140691
-
SHA1
8d1bc0c5bceedd229b8faaf6542779726188b145
-
SHA256
a15f29572a149a04d45b8c01daa047ec9f517077a507f8d53ac9b8a8ceed4a34
-
SHA512
e19c020f4fe1922a4adef3dd50851514a99852b7eefa9b74e6e954f941349a60589e171a618423d0029e8d3e8568536026a1012586a74daa4d19a1ebabb701a7
-
SSDEEP
768:xZZOUUP++sgCpDgSE2WPENq+qrD/PESqitk3Spn1eqy1nUNamt:m+qCNgNgqdj1qitvl
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-