General
-
Target
1a428412d3273adae489011beee943b12fbb069b6e22015bf7849b722696a29a.zip
-
Size
1.3MB
-
Sample
230928-sw8n3scd81
-
MD5
bb4c4b04e48469c41642fccc94e64c24
-
SHA1
b6795b35d33786f06e9e202d182cf1a5cae0ec7e
-
SHA256
6ea43bea362695fdd8455719e14286f12811e9d5581ac062a135acf469490007
-
SHA512
4bdd8605d09aaa605b5717eba9c2809fe511a48e57f567edba341001432557c22c0a865e873066c69ab376d6c3fd30138305c957032fffaa4767c40f4ed5cdf0
-
SSDEEP
24576:mDRagjDbPMS9nWxLA6OLI4zhyqo87uJMgKNaVZClV2JEn8TmdCAQBgK:oPMSVGA6S5g+7uOPNaVmV2Jy8TmEJd
Behavioral task
behavioral1
Sample
1a428412d3273adae489011beee943b12fbb069b6e22015bf7849b722696a29a.zip
Resource
win10v2004-20230915-en
Malware Config
Targets
-
-
Target
1a428412d3273adae489011beee943b12fbb069b6e22015bf7849b722696a29a.zip
-
Size
1.3MB
-
MD5
bb4c4b04e48469c41642fccc94e64c24
-
SHA1
b6795b35d33786f06e9e202d182cf1a5cae0ec7e
-
SHA256
6ea43bea362695fdd8455719e14286f12811e9d5581ac062a135acf469490007
-
SHA512
4bdd8605d09aaa605b5717eba9c2809fe511a48e57f567edba341001432557c22c0a865e873066c69ab376d6c3fd30138305c957032fffaa4767c40f4ed5cdf0
-
SSDEEP
24576:mDRagjDbPMS9nWxLA6OLI4zhyqo87uJMgKNaVZClV2JEn8TmdCAQBgK:oPMSVGA6S5g+7uOPNaVmV2Jy8TmEJd
Score1/10 -
-
-
Target
3.4.2_34024.exe
-
Size
1.4MB
-
MD5
608bcdfd89dc6d80c7f20de0cfc02ba7
-
SHA1
8475d332bb64efc5fc3f45634ffe25272b8797e1
-
SHA256
1a428412d3273adae489011beee943b12fbb069b6e22015bf7849b722696a29a
-
SHA512
1ec4a7b7f0a55ceeb6e1bae3ffef3390b5b5827358d60d2fe6c6ecc4463c5f86f392c6bb7a4c72e99c7709480fac9c4d8eeb28ef524df2d578f5de4e90130409
-
SSDEEP
24576:1Uv18lc6PJkDSJ0mTI03pAcLA1UqS5Kjkx1LG9JRhPkaq/JL:1U98lc6aDfm5/yUNfxIRh8aqh
-
Downloads MZ/PE file
-
Modifies Installed Components in the registry
-
Sets file execution options in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Registers COM server for autorun
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
4Browser Extensions
1Privilege Escalation
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
4Defense Evasion
Modify Registry
8Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1