General
-
Target
BIN.exe
-
Size
2.1MB
-
Sample
231011-gq9teade6w
-
MD5
066dbf69cbfa16c46a2142a257c95f1d
-
SHA1
0300eb287c3e29642877772c348c6b683b86a305
-
SHA256
a075c57c5e9ab478af53bbfa19faf2fecb404abd0d1ba953e84d347d5093f906
-
SHA512
c1874bf3d3c6c56168eec1b18242af7562696e9c556ab7612b4c592b78b76286ce80a44cd55222df39f4e85e27cdf19b084dfd0a24127a73615f04545925da7a
-
SSDEEP
49152:wkQTArh5KH1JME1y9fb95r/6LGoc30b9KJp9D06dkRNLkL+mrcTuZqy:warh5s41rL6WY6SRpO+dTuZP
Static task
static1
Behavioral task
behavioral1
Sample
BIN.exe
Resource
win7-20230831-en
Malware Config
Targets
-
-
Target
BIN.exe
-
Size
2.1MB
-
MD5
066dbf69cbfa16c46a2142a257c95f1d
-
SHA1
0300eb287c3e29642877772c348c6b683b86a305
-
SHA256
a075c57c5e9ab478af53bbfa19faf2fecb404abd0d1ba953e84d347d5093f906
-
SHA512
c1874bf3d3c6c56168eec1b18242af7562696e9c556ab7612b4c592b78b76286ce80a44cd55222df39f4e85e27cdf19b084dfd0a24127a73615f04545925da7a
-
SSDEEP
49152:wkQTArh5KH1JME1y9fb95r/6LGoc30b9KJp9D06dkRNLkL+mrcTuZqy:warh5s41rL6WY6SRpO+dTuZP
-
WSHRAT payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-