General
-
Target
source_prepared.py
-
Size
61KB
-
Sample
231109-3yk1xahc94
-
MD5
c099d8d9a2701b4453693947be836212
-
SHA1
12a1ae933a39858365b476d34e352ca7968257a0
-
SHA256
f939dcecd8b43cf10246d186a288d4d9239bff58d15749ede2a5095ff2993717
-
SHA512
46a8e5f5e64ff5941ff62442f20efa910063c229bf97a8d11237b4ef2f4db448c69cd0ddda95a70ced8aa3ad044a415aa86bf41da35523bf3029217684b055ef
-
SSDEEP
768:p6omiuXUkrIkmFfheb1JUVZ7lLDoXEs9z8LQLsB5y:p7miTBI1JUVZ7lAdprsB8
Behavioral task
behavioral1
Sample
source_prepared.py
Resource
win10v2004-20231020-en
Malware Config
Targets
-
-
Target
source_prepared.py
-
Size
61KB
-
MD5
c099d8d9a2701b4453693947be836212
-
SHA1
12a1ae933a39858365b476d34e352ca7968257a0
-
SHA256
f939dcecd8b43cf10246d186a288d4d9239bff58d15749ede2a5095ff2993717
-
SHA512
46a8e5f5e64ff5941ff62442f20efa910063c229bf97a8d11237b4ef2f4db448c69cd0ddda95a70ced8aa3ad044a415aa86bf41da35523bf3029217684b055ef
-
SSDEEP
768:p6omiuXUkrIkmFfheb1JUVZ7lLDoXEs9z8LQLsB5y:p7miTBI1JUVZ7lAdprsB8
Score8/10-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Registers COM server for autorun
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-