General
-
Target
KMSpico hackvshack.net.rar
-
Size
6.6MB
-
Sample
230304-xm664sea4t
-
MD5
02fac15eeb1a668e3570e888fbb7d11a
-
SHA1
4f8ed74f0294b9fb31332e9fd7b1116ffb0022c1
-
SHA256
e003aafce833d0c78440f6fac3c4251e880a6883abeeb37b92cc507441e10531
-
SHA512
da926d71331c096269188e9d7178c343f350983f5bf76a3febe35b4e5f4cfa66a19537b24ccf166abb43335d605d7a8d4fc155f90052efcf02bcf20f90b81a52
-
SSDEEP
196608:AHIhM1N+NuPAjLXptTfieG5PNokzSPvlncXJIso:A33+bZtLg5FokYNcXJfo
Static task
static1
Malware Config
Extracted
cryptbot
http://xjuwir54.top/gate.php
Targets
-
-
Target
KMSpico/Files/Setup_KMS_Pico_Full_File.exe
-
Size
6.8MB
-
MD5
bab8700e9b4c73eae3b1f44c37cdbe51
-
SHA1
556d004fdba6021bdd94abad27a52d4d47f4ded9
-
SHA256
955d3d25d3b9aa6bd0945275e763bbb39d9c94c608d8edd3870281978e4a3ac9
-
SHA512
e886739161a048637acdc21c01dae757bd7081683a3118afc08449c89ac4eccb0dfda56d201b006fd72665a57cd8e64f5ec7d3a2d2ba49a99c259e1d53375da5
-
SSDEEP
196608:fpWJ+qDbY9GW37lta6+qJPRo/vRqId1g827kh:00qI9H7za6nJsJqIwgh
-
Creates new service(s)
-
Sets file execution options in registry
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-