General
-
Target
ac09150aab27e38555a4b45e7067e43a1f860f756bea4129efb89189720e9d1b
-
Size
223KB
-
Sample
231107-sd947aah9s
-
MD5
c51bf0b28bfdef82dd3e832ac9b349ca
-
SHA1
66cb4de78b7e48288a6c3131564312249e234b92
-
SHA256
ac09150aab27e38555a4b45e7067e43a1f860f756bea4129efb89189720e9d1b
-
SHA512
6723079672a2cee774a53f0f7c0007a421e16b60b602bc2cd837bb30d74c2ccafbca7c4ad81ced5942a6b90a074433cc212f28c360b406e82b1914d122dbe854
-
SSDEEP
3072:cZ7wXfSRZ0ON/EwW66wN94xu4CkAZJM2k5D66L+NfGbVON2Nqi/6gS5UoWXHz72n:kwPSUONLNsuWA7koN+boRi9S6oiz72D
Behavioral task
behavioral1
Sample
ac09150aab27e38555a4b45e7067e43a1f860f756bea4129efb89189720e9d1b.exe
Resource
win7-20231020-en
Malware Config
Targets
-
-
Target
ac09150aab27e38555a4b45e7067e43a1f860f756bea4129efb89189720e9d1b
-
Size
223KB
-
MD5
c51bf0b28bfdef82dd3e832ac9b349ca
-
SHA1
66cb4de78b7e48288a6c3131564312249e234b92
-
SHA256
ac09150aab27e38555a4b45e7067e43a1f860f756bea4129efb89189720e9d1b
-
SHA512
6723079672a2cee774a53f0f7c0007a421e16b60b602bc2cd837bb30d74c2ccafbca7c4ad81ced5942a6b90a074433cc212f28c360b406e82b1914d122dbe854
-
SSDEEP
3072:cZ7wXfSRZ0ON/EwW66wN94xu4CkAZJM2k5D66L+NfGbVON2Nqi/6gS5UoWXHz72n:kwPSUONLNsuWA7koN+boRi9S6oiz72D
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Drops file in System32 directory
-