General
-
Target
download.jpeg
-
Size
4KB
-
Sample
230513-w448eagh94
-
MD5
0a49cf62527108fe0e5a004bd77c82c9
-
SHA1
73b6d43f0aa871d24a9266e1c6f234fb9f533f53
-
SHA256
4a0e60744a38203321017c18ac27b19cb99b588229daf735db67a2839a6ba128
-
SHA512
ce729be4f9bf703decb3d98f39cf061d310e153eafdb6447697437bae8873a1f004ec654d7633e0bb152ea1437cbaa59034ab0f29623ba1e6f82ac05eff38aaf
-
SSDEEP
96:CN39ZLBa18r6YJqhEZ8lB9hJKX3ijHbE08TafvlkNiw9EnaXYd+O:efFaRQGlP7w3ijHA0aivlAFeoYkO
Static task
static1
Behavioral task
behavioral1
Sample
download.jpg
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
download.jpeg
-
Size
4KB
-
MD5
0a49cf62527108fe0e5a004bd77c82c9
-
SHA1
73b6d43f0aa871d24a9266e1c6f234fb9f533f53
-
SHA256
4a0e60744a38203321017c18ac27b19cb99b588229daf735db67a2839a6ba128
-
SHA512
ce729be4f9bf703decb3d98f39cf061d310e153eafdb6447697437bae8873a1f004ec654d7633e0bb152ea1437cbaa59034ab0f29623ba1e6f82ac05eff38aaf
-
SSDEEP
96:CN39ZLBa18r6YJqhEZ8lB9hJKX3ijHbE08TafvlkNiw9EnaXYd+O:efFaRQGlP7w3ijHA0aivlAFeoYkO
Score8/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Registers COM server for autorun
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-