General
-
Target
16312178a6daa3247bfc00c458bf6499.exe
-
Size
599KB
-
Sample
230504-pffrksea61
-
MD5
16312178a6daa3247bfc00c458bf6499
-
SHA1
dd212de3318df8f39ae886ffb6460b1cb3bf969a
-
SHA256
bf37e108dfbfc88bb1d750c9318437c9ba16097f3a5a1047b5c70529029b7997
-
SHA512
d0a089959ef84fc6c958bcc12d5afb93e684e24a6c56263619f5d230a81af7f5179380ee8b968a08144ad5989a66a9bc3b2570d964af528a2429a5e9980d6e1c
-
SSDEEP
12288:fMruy90Dgs/WoX1I3Cpo3Lt+Nw+1vU5GcR3He2np:hyQgs/WgaSm34bTW3+2np
Static task
static1
Behavioral task
behavioral1
Sample
16312178a6daa3247bfc00c458bf6499.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
16312178a6daa3247bfc00c458bf6499.exe
-
Size
599KB
-
MD5
16312178a6daa3247bfc00c458bf6499
-
SHA1
dd212de3318df8f39ae886ffb6460b1cb3bf969a
-
SHA256
bf37e108dfbfc88bb1d750c9318437c9ba16097f3a5a1047b5c70529029b7997
-
SHA512
d0a089959ef84fc6c958bcc12d5afb93e684e24a6c56263619f5d230a81af7f5179380ee8b968a08144ad5989a66a9bc3b2570d964af528a2429a5e9980d6e1c
-
SSDEEP
12288:fMruy90Dgs/WoX1I3Cpo3Lt+Nw+1vU5GcR3He2np:hyQgs/WgaSm34bTW3+2np
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-