General
-
Target
4a63c82c08fe3dab78d0be7192bdfe4c811c188d28fb98323f92dca44045e038
-
Size
4.4MB
-
Sample
231121-dh3hkscd6x
-
MD5
4459ddf6f1c3484e5f9cdbeda941aa99
-
SHA1
359b03153d3deb165b1f10ccfdae8fdf82d5e294
-
SHA256
4a63c82c08fe3dab78d0be7192bdfe4c811c188d28fb98323f92dca44045e038
-
SHA512
2cfe1b9b58174e3d8603654669a86e0821a3a7868ce479cd357593a07c16bf24ca3921707b3f3521b7bada1cfe97a8b99f2ebb0c693ea4ec52a058a56e3cd29f
-
SSDEEP
49152:oTGkQk5QZuTtS0rQMYOQ+q8CEjTG4QWTGHQ39KFeM7:oKkrWsM0r1QnIK4LKHw0Feu
Behavioral task
behavioral1
Sample
4a63c82c08fe3dab78d0be7192bdfe4c811c188d28fb98323f92dca44045e038.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
4a63c82c08fe3dab78d0be7192bdfe4c811c188d28fb98323f92dca44045e038.exe
Resource
win10v2004-20231023-en
Malware Config
Targets
-
-
Target
4a63c82c08fe3dab78d0be7192bdfe4c811c188d28fb98323f92dca44045e038
-
Size
4.4MB
-
MD5
4459ddf6f1c3484e5f9cdbeda941aa99
-
SHA1
359b03153d3deb165b1f10ccfdae8fdf82d5e294
-
SHA256
4a63c82c08fe3dab78d0be7192bdfe4c811c188d28fb98323f92dca44045e038
-
SHA512
2cfe1b9b58174e3d8603654669a86e0821a3a7868ce479cd357593a07c16bf24ca3921707b3f3521b7bada1cfe97a8b99f2ebb0c693ea4ec52a058a56e3cd29f
-
SSDEEP
49152:oTGkQk5QZuTtS0rQMYOQ+q8CEjTG4QWTGHQ39KFeM7:oKkrWsM0r1QnIK4LKHw0Feu
Score8/10-
Drops file in Drivers directory
-
Manipulates Digital Signatures
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Drops file in System32 directory
-