General
-
Target
file.exe
-
Size
7.3MB
-
Sample
230203-2g3zqabe46
-
MD5
038ac6de85184acb806a11c68927124b
-
SHA1
6489fdb08ba72e7c3280fc3fa1ba1642093337b8
-
SHA256
f11cfa8c6ef5b3f0eba4f2748d802e8dbfae5056eac59d6e14d9223069af751b
-
SHA512
7142e30b53356a4295441a5e200621e082fba712e5c9f8f877195f16056e4cb468b0292fb974982735f7eb2338bd4b0c4e56e2f1d9ee90ed898b383d4747b9b9
-
SSDEEP
196608:91OZQqjN0X/565pO6N7PPZneRAZPN8Ljl32JLbE:3OZQqC6xZYAPwWw
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
Malware Config
Targets
-
-
Target
file.exe
-
Size
7.3MB
-
MD5
038ac6de85184acb806a11c68927124b
-
SHA1
6489fdb08ba72e7c3280fc3fa1ba1642093337b8
-
SHA256
f11cfa8c6ef5b3f0eba4f2748d802e8dbfae5056eac59d6e14d9223069af751b
-
SHA512
7142e30b53356a4295441a5e200621e082fba712e5c9f8f877195f16056e4cb468b0292fb974982735f7eb2338bd4b0c4e56e2f1d9ee90ed898b383d4747b9b9
-
SSDEEP
196608:91OZQqjN0X/565pO6N7PPZneRAZPN8Ljl32JLbE:3OZQqC6xZYAPwWw
-
Blocklisted process makes network request
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-