General
-
Target
NEAS.640ef9afce45a61a02970462b829bf37a845948c17d72577dc70c1c21aa55b23.url
-
Size
204B
-
Sample
231117-t4rafaba85
-
MD5
9125bafd876eda003abefbcfd3280900
-
SHA1
5d045bdedaae6242de78f8a89fceca748f279a0d
-
SHA256
640ef9afce45a61a02970462b829bf37a845948c17d72577dc70c1c21aa55b23
-
SHA512
69df286a83a636dbdaf9a2b0e4b30ff8b716245244f475ee945f498aadd37d5cab9edef3e1a73710d46eb4b36e99daa39bb4201b26ae149eff63896aead13111
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.640ef9afce45a61a02970462b829bf37a845948c17d72577dc70c1c21aa55b23.url
Resource
win7-20231025-en
Malware Config
Extracted
systembc
62.173.140.37:4001
Targets
-
-
Target
NEAS.640ef9afce45a61a02970462b829bf37a845948c17d72577dc70c1c21aa55b23.url
-
Size
204B
-
MD5
9125bafd876eda003abefbcfd3280900
-
SHA1
5d045bdedaae6242de78f8a89fceca748f279a0d
-
SHA256
640ef9afce45a61a02970462b829bf37a845948c17d72577dc70c1c21aa55b23
-
SHA512
69df286a83a636dbdaf9a2b0e4b30ff8b716245244f475ee945f498aadd37d5cab9edef3e1a73710d46eb4b36e99daa39bb4201b26ae149eff63896aead13111
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-