General
-
Target
93debdd227c967d16c9f6ebe0c46437e4673d2dc0c025e518ffb48c848c9c8e6
-
Size
2.5MB
-
Sample
231101-1tdpxsde9z
-
MD5
d7ac91afed57f5027fe2871b06e35f87
-
SHA1
3749d7ca0fd3c357e9e300147e32ce4766bb239a
-
SHA256
93debdd227c967d16c9f6ebe0c46437e4673d2dc0c025e518ffb48c848c9c8e6
-
SHA512
1c24a633b3ef001e886e0a57f4a2d40eacce11a014aee09ad90fcc50174e875f744e85054b3c5767082148c3c1c972b86dcf8c777972b227df17e97d61cc58c8
-
SSDEEP
24576:tjSokU1riJjSow1NJbKkKF/eMNPjSHHHn:tjSn6riJjStv9KFeMW
Behavioral task
behavioral1
Sample
93debdd227c967d16c9f6ebe0c46437e4673d2dc0c025e518ffb48c848c9c8e6.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
93debdd227c967d16c9f6ebe0c46437e4673d2dc0c025e518ffb48c848c9c8e6.exe
Resource
win10v2004-20231020-en
Malware Config
Targets
-
-
Target
93debdd227c967d16c9f6ebe0c46437e4673d2dc0c025e518ffb48c848c9c8e6
-
Size
2.5MB
-
MD5
d7ac91afed57f5027fe2871b06e35f87
-
SHA1
3749d7ca0fd3c357e9e300147e32ce4766bb239a
-
SHA256
93debdd227c967d16c9f6ebe0c46437e4673d2dc0c025e518ffb48c848c9c8e6
-
SHA512
1c24a633b3ef001e886e0a57f4a2d40eacce11a014aee09ad90fcc50174e875f744e85054b3c5767082148c3c1c972b86dcf8c777972b227df17e97d61cc58c8
-
SSDEEP
24576:tjSokU1riJjSow1NJbKkKF/eMNPjSHHHn:tjSn6riJjStv9KFeMW
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Drops file in System32 directory
-