General
-
Target
bdf45688b46b2443bd8a14e567094f0d0d418e02af76935eb07775b5db122862
-
Size
3.1MB
-
Sample
231021-knv41sdf2z
-
MD5
f407e8b2faee3715b87447b7f794ee32
-
SHA1
7fb95c5f281b22b967988f4f84d11c8462d6bdd4
-
SHA256
bdf45688b46b2443bd8a14e567094f0d0d418e02af76935eb07775b5db122862
-
SHA512
5ca1810022fbd431bf19f71ea5f5981726f5a01be29cff7fd304583ddc33f1957b86ae8f340f8b89f27d07e308a7572a418db2722c38aab6411df4bfc4c09724
-
SSDEEP
24576:OQ6n+8aUyQ6n+BUzJbKkKF/eMNPjMeed7SHHHR:OQ6nkQ6nd9KFeMKW
Behavioral task
behavioral1
Sample
bdf45688b46b2443bd8a14e567094f0d0d418e02af76935eb07775b5db122862.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
bdf45688b46b2443bd8a14e567094f0d0d418e02af76935eb07775b5db122862.exe
Resource
win10v2004-20231020-en
Malware Config
Targets
-
-
Target
bdf45688b46b2443bd8a14e567094f0d0d418e02af76935eb07775b5db122862
-
Size
3.1MB
-
MD5
f407e8b2faee3715b87447b7f794ee32
-
SHA1
7fb95c5f281b22b967988f4f84d11c8462d6bdd4
-
SHA256
bdf45688b46b2443bd8a14e567094f0d0d418e02af76935eb07775b5db122862
-
SHA512
5ca1810022fbd431bf19f71ea5f5981726f5a01be29cff7fd304583ddc33f1957b86ae8f340f8b89f27d07e308a7572a418db2722c38aab6411df4bfc4c09724
-
SSDEEP
24576:OQ6n+8aUyQ6n+BUzJbKkKF/eMNPjMeed7SHHHR:OQ6nkQ6nd9KFeMKW
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Drops file in System32 directory
-