General
-
Target
file.exe
-
Size
410KB
-
Sample
230519-qcmw6aea49
-
MD5
e80264156b7c26f7495709faa23ffdb7
-
SHA1
5d497c936ee71cc18125793bba524e4832a10789
-
SHA256
aa4bbc0296b28232d20ca66e74e55dea3f82ca212db912fbc0825c93403654a9
-
SHA512
697c7d64c1b8f07cede094aa6ace876dd9d3eac3c634036764eb464196e8a41ce3d93ff878d9e6b2cb0a5ea35a93aa123f75463f1571b38acd7e53ee1e4c5ec8
-
SSDEEP
12288:9+cpD7KsRbSQ82gxVB5mSNDtdLCXZC/QuQ/g+LjQRohyqBoHCK0iOEfoh4c3QCNo:HpD0b
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
file.exe
-
Size
410KB
-
MD5
e80264156b7c26f7495709faa23ffdb7
-
SHA1
5d497c936ee71cc18125793bba524e4832a10789
-
SHA256
aa4bbc0296b28232d20ca66e74e55dea3f82ca212db912fbc0825c93403654a9
-
SHA512
697c7d64c1b8f07cede094aa6ace876dd9d3eac3c634036764eb464196e8a41ce3d93ff878d9e6b2cb0a5ea35a93aa123f75463f1571b38acd7e53ee1e4c5ec8
-
SSDEEP
12288:9+cpD7KsRbSQ82gxVB5mSNDtdLCXZC/QuQ/g+LjQRohyqBoHCK0iOEfoh4c3QCNo:HpD0b
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-