General
-
Target
04639854539053e9c2a0eea9e38b5b6c.exe
-
Size
328KB
-
Sample
230310-pjy3bsfd5t
-
MD5
04639854539053e9c2a0eea9e38b5b6c
-
SHA1
f82c1215b7d4fbea5a136a483f9bd0d022ed36cd
-
SHA256
7db1175e55e2bc864c8e8f0915b5f4167cb0a49a87a751b3fa429be6dc4a8896
-
SHA512
aa0e94af988449358310000d94021b1fbbd7736e6ae505a79b88b14a6563f19157712b78d49e5e1b9e27b9f6a314823d3e8ad89d3ccc7979878fbea05f5acfb5
-
SSDEEP
6144:evSBanJK/5kPas8N0HEAAf1vbViarAWbd33UEPT:evjas8uHEAAtvBpkREPT
Static task
static1
Behavioral task
behavioral1
Sample
04639854539053e9c2a0eea9e38b5b6c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
04639854539053e9c2a0eea9e38b5b6c.exe
Resource
win10v2004-20230221-en
Malware Config
Targets
-
-
Target
04639854539053e9c2a0eea9e38b5b6c.exe
-
Size
328KB
-
MD5
04639854539053e9c2a0eea9e38b5b6c
-
SHA1
f82c1215b7d4fbea5a136a483f9bd0d022ed36cd
-
SHA256
7db1175e55e2bc864c8e8f0915b5f4167cb0a49a87a751b3fa429be6dc4a8896
-
SHA512
aa0e94af988449358310000d94021b1fbbd7736e6ae505a79b88b14a6563f19157712b78d49e5e1b9e27b9f6a314823d3e8ad89d3ccc7979878fbea05f5acfb5
-
SSDEEP
6144:evSBanJK/5kPas8N0HEAAf1vbViarAWbd33UEPT:evjas8uHEAAtvBpkREPT
Score10/10-
Detects PseudoManuscrypt payload
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
PseudoManuscrypt
PseudoManuscrypt is a malware Lazarus’s Manuscrypt targeting government organizations and ICS.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-