General
-
Target
215601203945b53a44e0344ac6e3e410bdb9a21d418e8068ee43eceee858c4fa
-
Size
2.3MB
-
Sample
230918-lmnh8aag97
-
MD5
e411dafeed1860501790f8ae6ae7a95d
-
SHA1
fcb250e133067714ff87bf1483c7d3e11d6fc1be
-
SHA256
215601203945b53a44e0344ac6e3e410bdb9a21d418e8068ee43eceee858c4fa
-
SHA512
f52f0ad99cd9acdff0693b528395f6040b23de8019e892a9c86beac1f5c6f56418224aa9f54490324cd1ae54a502ba338162f083ee1a7a464e97a045ca06270e
-
SSDEEP
49152:4vODijuUoszTB8QXnQv6tj1SQYSQG9KFeMs:4mDb6ZEQFZ0Fep
Behavioral task
behavioral1
Sample
215601203945b53a44e0344ac6e3e410bdb9a21d418e8068ee43eceee858c4fa.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
215601203945b53a44e0344ac6e3e410bdb9a21d418e8068ee43eceee858c4fa.exe
Resource
win10v2004-20230915-en
Malware Config
Targets
-
-
Target
215601203945b53a44e0344ac6e3e410bdb9a21d418e8068ee43eceee858c4fa
-
Size
2.3MB
-
MD5
e411dafeed1860501790f8ae6ae7a95d
-
SHA1
fcb250e133067714ff87bf1483c7d3e11d6fc1be
-
SHA256
215601203945b53a44e0344ac6e3e410bdb9a21d418e8068ee43eceee858c4fa
-
SHA512
f52f0ad99cd9acdff0693b528395f6040b23de8019e892a9c86beac1f5c6f56418224aa9f54490324cd1ae54a502ba338162f083ee1a7a464e97a045ca06270e
-
SSDEEP
49152:4vODijuUoszTB8QXnQv6tj1SQYSQG9KFeMs:4mDb6ZEQFZ0Fep
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Drops file in System32 directory
-