General
-
Target
tmp
-
Size
1.5MB
-
Sample
230418-ramdaadf3s
-
MD5
ed39673734eff4d28d754f3eb85848a6
-
SHA1
7283be5164b9716b9da9e7fb083d378e140076ea
-
SHA256
4b320d54e63f91ba0b0efe3a8b87d3bc56ad736a1e591269322d4cf14657e513
-
SHA512
6b241999e6e7433711d7d33fdf6916db1eee356082a8ba283bc284fb94958f7e255f3d12979ca1f938683a337c5bae4abaac56c094b3bcf1d6da7cbc89cde7e9
-
SSDEEP
49152:hY1Pnufr5l0tDjebQF/g3rrmAUHDa1cP/m:W5ErMtD6bQFoPYja4O
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
tmp
-
Size
1.5MB
-
MD5
ed39673734eff4d28d754f3eb85848a6
-
SHA1
7283be5164b9716b9da9e7fb083d378e140076ea
-
SHA256
4b320d54e63f91ba0b0efe3a8b87d3bc56ad736a1e591269322d4cf14657e513
-
SHA512
6b241999e6e7433711d7d33fdf6916db1eee356082a8ba283bc284fb94958f7e255f3d12979ca1f938683a337c5bae4abaac56c094b3bcf1d6da7cbc89cde7e9
-
SSDEEP
49152:hY1Pnufr5l0tDjebQF/g3rrmAUHDa1cP/m:W5ErMtD6bQFoPYja4O
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-