General
-
Target
file.exe
-
Size
7.2MB
-
Sample
231103-n2wjgsca95
-
MD5
8e03fddc51dbea3d46962e2b27810f3d
-
SHA1
90ccd0faef0ab7225a1f879fd818d7659b79826c
-
SHA256
83cf1a0e95e1ea5a5780f49aab15c1aba377d4d280aa8fc3a7f8cc9a0b4f3e22
-
SHA512
e9f1e39b5a045a08a59001debb7b4714ffdea937a2fb24bd7cef35da89f7635d8dabfe53485ba811b09e39fa1d612f2b7b02cfda84a7a9f5c787c6ed7deff72c
-
SSDEEP
196608:91OHECEyCZ9QSPUFKngcMbezZctfsggmeW0Eso:3OHEykfPUFKgLCz6KYP
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231023-en
Malware Config
Targets
-
-
Target
file.exe
-
Size
7.2MB
-
MD5
8e03fddc51dbea3d46962e2b27810f3d
-
SHA1
90ccd0faef0ab7225a1f879fd818d7659b79826c
-
SHA256
83cf1a0e95e1ea5a5780f49aab15c1aba377d4d280aa8fc3a7f8cc9a0b4f3e22
-
SHA512
e9f1e39b5a045a08a59001debb7b4714ffdea937a2fb24bd7cef35da89f7635d8dabfe53485ba811b09e39fa1d612f2b7b02cfda84a7a9f5c787c6ed7deff72c
-
SSDEEP
196608:91OHECEyCZ9QSPUFKngcMbezZctfsggmeW0Eso:3OHEykfPUFKgLCz6KYP
-
Blocklisted process makes network request
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-