General
-
Target
tmp
-
Size
478KB
-
Sample
230314-fegstafe4v
-
MD5
f7cbc00aaa716599bcf6a24f65b3302e
-
SHA1
ea2d7a7b46c02a406fc2c0e9340e2ca3f82339e3
-
SHA256
90be90ad4fb906574f9e7afe587f0826a71152bfc32cfc665a58877562f2edd4
-
SHA512
e0a6033d683e3f0326f9c217bdcd68f13b2ea86e97640a07603d0624b27bb894044c77d3f87bad02c3fd81e8f7ec7d47a52856e2baba0182e5f7619f670def17
-
SSDEEP
6144:I4RdON3a95E/o9sQUN2Ih+Md56jvum2Yum+4VYbe:I4RdON3a8/o9sQTIh+Mry+N
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
C:\Users\Admin\Desktop\FILE RECOVERY.txt
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion/mallox/privateSignin
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion
Extracted
C:\Program Files\7-Zip\Lang\FILE RECOVERY.txt
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion/mallox/privateSignin
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion
Targets
-
-
Target
tmp
-
Size
478KB
-
MD5
f7cbc00aaa716599bcf6a24f65b3302e
-
SHA1
ea2d7a7b46c02a406fc2c0e9340e2ca3f82339e3
-
SHA256
90be90ad4fb906574f9e7afe587f0826a71152bfc32cfc665a58877562f2edd4
-
SHA512
e0a6033d683e3f0326f9c217bdcd68f13b2ea86e97640a07603d0624b27bb894044c77d3f87bad02c3fd81e8f7ec7d47a52856e2baba0182e5f7619f670def17
-
SSDEEP
6144:I4RdON3a95E/o9sQUN2Ih+Md56jvum2Yum+4VYbe:I4RdON3a8/o9sQTIh+Mry+N
Score10/10-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-