General
-
Target
file
-
Size
7.2MB
-
Sample
230206-d9lddabh84
-
MD5
1078c9a61262f49cd4a80464d3b3d4d4
-
SHA1
33f227476ac67560f01e7ba6eacc5b07575c545f
-
SHA256
365864f4998879df7fcac700b84e40172b9b3aadfd5032fd38801499eb64e90e
-
SHA512
ccc8e0b06467fdbcb2b1843f38a0035a7a55870d6e743c0dddaae15232808c7aa283e5898f67e3edc1997a021b9c0d7ccf31f348acf3d8dfbc84f5025a7a2a44
-
SSDEEP
98304:91Of2m4GZm0Ii6C5IdFuFR+jYLZupYX6hsn3vYdRROL7uK3Wa5sIVBMw1vyTa:91OfeVbMIKFR+jYluk9vYlYZRjvqa
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Malware Config
Targets
-
-
Target
file
-
Size
7.2MB
-
MD5
1078c9a61262f49cd4a80464d3b3d4d4
-
SHA1
33f227476ac67560f01e7ba6eacc5b07575c545f
-
SHA256
365864f4998879df7fcac700b84e40172b9b3aadfd5032fd38801499eb64e90e
-
SHA512
ccc8e0b06467fdbcb2b1843f38a0035a7a55870d6e743c0dddaae15232808c7aa283e5898f67e3edc1997a021b9c0d7ccf31f348acf3d8dfbc84f5025a7a2a44
-
SSDEEP
98304:91Of2m4GZm0Ii6C5IdFuFR+jYLZupYX6hsn3vYdRROL7uK3Wa5sIVBMw1vyTa:91OfeVbMIKFR+jYluk9vYlYZRjvqa
-
Blocklisted process makes network request
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-