General
-
Target
chuaname.exe
-
Size
157KB
-
Sample
230630-xt8craed43
-
MD5
5767ca40c29cb20842c8d3b12c93d582
-
SHA1
8fe5bcd90416a48b3f862ea52f726239d2d8efc3
-
SHA256
a14f448e7fbeed5aee2f0db602bca444bb821e731452e0e43f914b1cd902fec5
-
SHA512
9c6fd9ffb1b0ea6305c4ed893923aa2e21ccaa63797b36458dc63eabd84e01cbc6b3331d808b58c79ae74122ee841872ab1e12683f8065ba0f40042f7f8b6321
-
SSDEEP
3072:s2A2+ClsFxK7hfi5ji+8T26z02mNt4H96u:/AbZFx4h2uaew4Hn
Static task
static1
Behavioral task
behavioral1
Sample
chuaname.exe
Resource
win10v2004-20230621-en
Malware Config
Extracted
Protocol: ftp- Host:
38.54.95.217 - Port:
21 - Username:
123 - Password:
123
Targets
-
-
Target
chuaname.exe
-
Size
157KB
-
MD5
5767ca40c29cb20842c8d3b12c93d582
-
SHA1
8fe5bcd90416a48b3f862ea52f726239d2d8efc3
-
SHA256
a14f448e7fbeed5aee2f0db602bca444bb821e731452e0e43f914b1cd902fec5
-
SHA512
9c6fd9ffb1b0ea6305c4ed893923aa2e21ccaa63797b36458dc63eabd84e01cbc6b3331d808b58c79ae74122ee841872ab1e12683f8065ba0f40042f7f8b6321
-
SSDEEP
3072:s2A2+ClsFxK7hfi5ji+8T26z02mNt4H96u:/AbZFx4h2uaew4Hn
Score10/10-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-