General
-
Target
4c23f122b79aea1ddc7f3fad57be19bc.bin
-
Size
58KB
-
Sample
230303-bk68fafc2s
-
MD5
9e62fac12fe00b80b6f89fd59f662d0f
-
SHA1
1a414386443dd3bfaee5d7dc826460ce18642c39
-
SHA256
ff60cf87b086bd6fa4e3beedc2d85a1a5dbea65d2c8ee8eb22713c0fcb61b494
-
SHA512
40421e61f1b9002e12a4515fd42c4ee8e176c3b812a6e68b48ba27eb5d9dc7e4327faa263d0d0da22edb9f69e87fded41fab33e02de9f1c1388c32fbfcf48a1f
-
SSDEEP
1536:JIZkR0g6EwkEbXveCKXOepqu87IR2qLiyMAdk6unVReXuIhuavl:CZwuMuXv+XOGR2JAe6IVAa6
Static task
static1
Behavioral task
behavioral1
Sample
b4233a5f58161b20d27b87ec17701492601ba4d932513c9d22eb8f8b5ac34b76.vbs
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b4233a5f58161b20d27b87ec17701492601ba4d932513c9d22eb8f8b5ac34b76.vbs
Resource
win10v2004-20230220-en
Malware Config
Extracted
http://185.29.10.113/Mugep.xtp
Targets
-
-
Target
b4233a5f58161b20d27b87ec17701492601ba4d932513c9d22eb8f8b5ac34b76.vbs
-
Size
104KB
-
MD5
4c23f122b79aea1ddc7f3fad57be19bc
-
SHA1
ffe08516f78803c82fe5f99b75aefd0488158957
-
SHA256
b4233a5f58161b20d27b87ec17701492601ba4d932513c9d22eb8f8b5ac34b76
-
SHA512
cf479b9ab1369ff85ba1026270042679b8ad7db577d1d01e037e4de01f7c6fb13a2d2497586f3ac63a8267d9dbebe6bb61900ba4fb09ff14001dd6ddb21ed47b
-
SSDEEP
3072:4M1vA5gZASC5xVeqlGHGw5fCm0eYW/G4xzZoXyxdKpXRR:4evvZkp90NoCvKJRR
Score10/10-
Blocklisted process makes network request
-
Checks QEMU agent file
Checks presence of QEMU agent, possibly to detect virtualization.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-