General
-
Target
e1b20a4789e5062987c0ca73b7de884c040c25b00db8368a0a8e7c19075f7f05
-
Size
4.7MB
-
Sample
231104-dbnqvaea93
-
MD5
7c2c7ce52b4bcca3cf977088a9f1048f
-
SHA1
433a250d6497346cf6cc6de692879e5dca53dfb6
-
SHA256
e1b20a4789e5062987c0ca73b7de884c040c25b00db8368a0a8e7c19075f7f05
-
SHA512
a339a01a728b51d7bd2a99fc9c2009622d38dcac3f73e63f226e0a4dd63439a308bef5ad854f987f7ec6d5cbec1738e49ac85ab3bed8add95c744010774dba62
-
SSDEEP
12288:nOuW5o/oStsvE4CWKKCrZTGF/k8uMxtxPvvzmf7NCN5KU2lPfXsKFJMnbYhY3PjT:njSow1vEJbKkKF/eMNPjm0NFZ
Behavioral task
behavioral1
Sample
e1b20a4789e5062987c0ca73b7de884c040c25b00db8368a0a8e7c19075f7f05.exe
Resource
win7-20231025-en
Malware Config
Targets
-
-
Target
e1b20a4789e5062987c0ca73b7de884c040c25b00db8368a0a8e7c19075f7f05
-
Size
4.7MB
-
MD5
7c2c7ce52b4bcca3cf977088a9f1048f
-
SHA1
433a250d6497346cf6cc6de692879e5dca53dfb6
-
SHA256
e1b20a4789e5062987c0ca73b7de884c040c25b00db8368a0a8e7c19075f7f05
-
SHA512
a339a01a728b51d7bd2a99fc9c2009622d38dcac3f73e63f226e0a4dd63439a308bef5ad854f987f7ec6d5cbec1738e49ac85ab3bed8add95c744010774dba62
-
SSDEEP
12288:nOuW5o/oStsvE4CWKKCrZTGF/k8uMxtxPvvzmf7NCN5KU2lPfXsKFJMnbYhY3PjT:njSow1vEJbKkKF/eMNPjm0NFZ
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Drops file in System32 directory
-