General
-
Target
f7b02278a2310a2657dcca702188af461ce8450dc0c5bced802773ca8eab6f50.exe
-
Size
490KB
-
Sample
230530-zgxrlabf55
-
MD5
a338043c6b5260df6b7ce4c4ec3d1b80
-
SHA1
087a787a34ee05478bfa07b50fd39c8367b0a157
-
SHA256
f7b02278a2310a2657dcca702188af461ce8450dc0c5bced802773ca8eab6f50
-
SHA512
c81b2f1aac6d249d43b485e8e536c22a8f44da09e31f118f9ddfd0f1ef6d1eba4b67e96d087b2148f45dc93e0de5ba0178c422088e110a40544a7b3b2ff4fccf
-
SSDEEP
6144:/6ho3IhHN5ya1R64TxT8jWHgf8YJkVHC++VeQPBZnq0LZYSwFxQx9tw39b5wGuJB:irhtHxpmWHgf8Y6/Qp1nLiDKIwf
Behavioral task
behavioral1
Sample
f7b02278a2310a2657dcca702188af461ce8450dc0c5bced802773ca8eab6f50.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f7b02278a2310a2657dcca702188af461ce8450dc0c5bced802773ca8eab6f50.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
gurcu
https://api.telegram.org/bot6104192483:AAFCcnr4FR2XCO83zUSAWWZ9J3qw4tRYQoI/sendMessage?chat_id=2076277850
Targets
-
-
Target
f7b02278a2310a2657dcca702188af461ce8450dc0c5bced802773ca8eab6f50.exe
-
Size
490KB
-
MD5
a338043c6b5260df6b7ce4c4ec3d1b80
-
SHA1
087a787a34ee05478bfa07b50fd39c8367b0a157
-
SHA256
f7b02278a2310a2657dcca702188af461ce8450dc0c5bced802773ca8eab6f50
-
SHA512
c81b2f1aac6d249d43b485e8e536c22a8f44da09e31f118f9ddfd0f1ef6d1eba4b67e96d087b2148f45dc93e0de5ba0178c422088e110a40544a7b3b2ff4fccf
-
SSDEEP
6144:/6ho3IhHN5ya1R64TxT8jWHgf8YJkVHC++VeQPBZnq0LZYSwFxQx9tw39b5wGuJB:irhtHxpmWHgf8Y6/Qp1nLiDKIwf
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-