General
-
Target
rms.host6.3ru.msi
-
Size
7.6MB
-
Sample
231218-lgn8kabdb2
-
MD5
4dc446d219e73f5218ad16b0f2c633d4
-
SHA1
0a4e6de0272180db99a6ad04a74da2ba129ea873
-
SHA256
fb48076d93e8705240d11e770cb928e79c4514cc4336e17bc845af33fedeb810
-
SHA512
8768ba91e9ff5f0b8dbab1977876d1058824d2f07b58184fcab8a76c60db210b459bd32a04e038a6fec8946c5021eef214c90289ca1af94a27069365311cc9b4
-
SSDEEP
196608:vw5w5SwnqgSGGmDW7dgf/668YsAtDyL4:4GwwnqLiDU+fS2
Static task
static1
Behavioral task
behavioral1
Sample
rms.host6.3ru.msi
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
rms.host6.3ru.msi
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
rms.host6.3ru.msi
-
Size
7.6MB
-
MD5
4dc446d219e73f5218ad16b0f2c633d4
-
SHA1
0a4e6de0272180db99a6ad04a74da2ba129ea873
-
SHA256
fb48076d93e8705240d11e770cb928e79c4514cc4336e17bc845af33fedeb810
-
SHA512
8768ba91e9ff5f0b8dbab1977876d1058824d2f07b58184fcab8a76c60db210b459bd32a04e038a6fec8946c5021eef214c90289ca1af94a27069365311cc9b4
-
SSDEEP
196608:vw5w5SwnqgSGGmDW7dgf/668YsAtDyL4:4GwwnqLiDU+fS2
Score10/10-
Registers new Print Monitor
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-