General
-
Target
tmp
-
Size
337KB
-
Sample
230509-hqw3zsge9t
-
MD5
de5cb59ff519da2f1bb531d0ee62d519
-
SHA1
4f781e6f0b96a752d88ef52ee7785aec9e4a9bb4
-
SHA256
77348361e60bd2f12aeb1d0928a38b8745de7e93069cfc7a9361a11f1c87d62a
-
SHA512
2aa9156a7b4b8c0e4b1ff2f3688ad990dbdbe33cd9207eb3a48d85c59629851896ab64b56e9b5d8cfb6b086ad16c66e99bb02ae5203a2eec41c6cc8a33e0579e
-
SSDEEP
6144:UW3VLg8VfqmPrdo32k95H858AA5VxQsJj+B/:UaBV7Prdod99Q8As/M/
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
tmp
-
Size
337KB
-
MD5
de5cb59ff519da2f1bb531d0ee62d519
-
SHA1
4f781e6f0b96a752d88ef52ee7785aec9e4a9bb4
-
SHA256
77348361e60bd2f12aeb1d0928a38b8745de7e93069cfc7a9361a11f1c87d62a
-
SHA512
2aa9156a7b4b8c0e4b1ff2f3688ad990dbdbe33cd9207eb3a48d85c59629851896ab64b56e9b5d8cfb6b086ad16c66e99bb02ae5203a2eec41c6cc8a33e0579e
-
SSDEEP
6144:UW3VLg8VfqmPrdo32k95H858AA5VxQsJj+B/:UaBV7Prdod99Q8As/M/
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-