General
-
Target
9f2a9306317e06d37364c4622791ce551093e3cc51104078631b9a2a28aa4877
-
Size
143KB
-
Sample
230605-yca7csba7s
-
MD5
4dbe432b8c1bbe4b3a45f2b202c1781d
-
SHA1
9aeae6ca0f74a0914316e3724bd485552211747b
-
SHA256
9f2a9306317e06d37364c4622791ce551093e3cc51104078631b9a2a28aa4877
-
SHA512
9ca345c66b9ba91f8d73f6fab8beb460f8e5339c6d92a75f64e7ba450823efa5d255b95fbe26fb9bc51140de65e33988bc09ed5ab910dad082aad991181d0488
-
SSDEEP
3072:1C7BOGKCXjYp8idHQbPRyZ2pP9EPgg0F:1GWCXdw8AZ2LEP
Static task
static1
Behavioral task
behavioral1
Sample
9f2a9306317e06d37364c4622791ce551093e3cc51104078631b9a2a28aa4877.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
9f2a9306317e06d37364c4622791ce551093e3cc51104078631b9a2a28aa4877.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
Protocol: ftp- Host:
38.54.104.71 - Port:
21 - Username:
123 - Password:
123
Targets
-
-
Target
9f2a9306317e06d37364c4622791ce551093e3cc51104078631b9a2a28aa4877
-
Size
143KB
-
MD5
4dbe432b8c1bbe4b3a45f2b202c1781d
-
SHA1
9aeae6ca0f74a0914316e3724bd485552211747b
-
SHA256
9f2a9306317e06d37364c4622791ce551093e3cc51104078631b9a2a28aa4877
-
SHA512
9ca345c66b9ba91f8d73f6fab8beb460f8e5339c6d92a75f64e7ba450823efa5d255b95fbe26fb9bc51140de65e33988bc09ed5ab910dad082aad991181d0488
-
SSDEEP
3072:1C7BOGKCXjYp8idHQbPRyZ2pP9EPgg0F:1GWCXdw8AZ2LEP
Score10/10-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-