General
-
Target
SKMBT18276392733.bat
-
Size
22KB
-
Sample
230517-ycc1ysgc35
-
MD5
244584512d6decb0d37cef150886e636
-
SHA1
fe50c7e039605957ab9bfd034f7861e6023d0093
-
SHA256
56107979d024223bd4ba443cf654ebfc32e19a3eaffd7a055fadb6ac1ce97866
-
SHA512
24613bbe96ab7befac49f8d4acd6b8a9d14bb0add1651412c0859d4031feabd2aa40e8e582a449af7acbb0eba6776de1b65f0ead759c7fcf089bf3d12eb46243
-
SSDEEP
384:b2VPeJS3xtpEG3cZrUKUE0gMGfa9720wvjeqzAzW6yeVf9jlP7JYK5zf8rh:bUWJS3xwQ8rUwMaaJ20wvjj0zLVRlzO5
Static task
static1
Behavioral task
behavioral1
Sample
SKMBT18276392733.bat
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
SKMBT18276392733.bat
-
Size
22KB
-
MD5
244584512d6decb0d37cef150886e636
-
SHA1
fe50c7e039605957ab9bfd034f7861e6023d0093
-
SHA256
56107979d024223bd4ba443cf654ebfc32e19a3eaffd7a055fadb6ac1ce97866
-
SHA512
24613bbe96ab7befac49f8d4acd6b8a9d14bb0add1651412c0859d4031feabd2aa40e8e582a449af7acbb0eba6776de1b65f0ead759c7fcf089bf3d12eb46243
-
SSDEEP
384:b2VPeJS3xtpEG3cZrUKUE0gMGfa9720wvjeqzAzW6yeVf9jlP7JYK5zf8rh:bUWJS3xwQ8rUwMaaJ20wvjj0zLVRlzO5
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-