General
-
Target
63a8c334667020e3fcafeeb3f9412f73ccdc6e864cf531d74fab8e13f8610fdf
-
Size
399KB
-
Sample
231114-jv1gmshg86
-
MD5
e3ca2c1817f5886acd4891afe806f971
-
SHA1
668a42b64aab015676f0d044b646d2248d6c25bf
-
SHA256
63a8c334667020e3fcafeeb3f9412f73ccdc6e864cf531d74fab8e13f8610fdf
-
SHA512
cef5ee8309f26f313311fc74047110e74f91af82ccb24ed6627ebec8eaf6d544e67632324ce2776eb93cf02166166f08af9b3656cb1c8ebb32857b9d96619add
-
SSDEEP
6144:YZmsQhU+bZVx5rLKJzu6gLP44ZwcDy/qF6cEOkCybEaQRXr9HNdvOapLv:8UF30Ngj44ecDyfOkx2LIapLv
Static task
static1
Behavioral task
behavioral1
Sample
63a8c334667020e3fcafeeb3f9412f73ccdc6e864cf531d74fab8e13f8610fdf.exe
Resource
win7-20231020-en
Malware Config
Targets
-
-
Target
63a8c334667020e3fcafeeb3f9412f73ccdc6e864cf531d74fab8e13f8610fdf
-
Size
399KB
-
MD5
e3ca2c1817f5886acd4891afe806f971
-
SHA1
668a42b64aab015676f0d044b646d2248d6c25bf
-
SHA256
63a8c334667020e3fcafeeb3f9412f73ccdc6e864cf531d74fab8e13f8610fdf
-
SHA512
cef5ee8309f26f313311fc74047110e74f91af82ccb24ed6627ebec8eaf6d544e67632324ce2776eb93cf02166166f08af9b3656cb1c8ebb32857b9d96619add
-
SSDEEP
6144:YZmsQhU+bZVx5rLKJzu6gLP44ZwcDy/qF6cEOkCybEaQRXr9HNdvOapLv:8UF30Ngj44ecDyfOkx2LIapLv
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Drops file in System32 directory
-