General
-
Target
0faa869e08d068297edd23ef8ac75f64
-
Size
2.2MB
-
Sample
231224-ytnh1sfebk
-
MD5
0faa869e08d068297edd23ef8ac75f64
-
SHA1
016b7a80418b57367e1d729ffaaf749394dda44e
-
SHA256
479d778eef8466818b7ad533ec36ec160796398a22fab717b162e7fd149f1b63
-
SHA512
32f62ad6ac667eff2babf02f97f2f15ec8276e7acd304158c1ebf9fba9fe98fdfc92cf5e4cacb3e4a038c13d2bb18285b5a62aa6499297f9d74615adf8075378
-
SSDEEP
24576:Xb5uYoANOFkQdELilVmyUkc35/lcPheUdzoYTjPZTGIAiiXRuUNK4dcoQL4:XbYYLNcgbkoWvdcYqiouUNMoO4
Static task
static1
Behavioral task
behavioral1
Sample
0faa869e08d068297edd23ef8ac75f64.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0faa869e08d068297edd23ef8ac75f64.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
http://galaint.statson-linesec.info/?0=187&1=0&2=1&3=81&4=i&5=7601&6=6&7=1&8=99600&9=1033&10=0&11=1111&12=vvvileubdb&14=1
Extracted
http://galaint.statson-linesec.info/?0=187&1=0&2=1&3=81&4=i&5=9200&6=6&7=2&8=919041&9=1033&10=0&11=1111&12=ddibvhbmwl&14=1
Targets
-
-
Target
0faa869e08d068297edd23ef8ac75f64
-
Size
2.2MB
-
MD5
0faa869e08d068297edd23ef8ac75f64
-
SHA1
016b7a80418b57367e1d729ffaaf749394dda44e
-
SHA256
479d778eef8466818b7ad533ec36ec160796398a22fab717b162e7fd149f1b63
-
SHA512
32f62ad6ac667eff2babf02f97f2f15ec8276e7acd304158c1ebf9fba9fe98fdfc92cf5e4cacb3e4a038c13d2bb18285b5a62aa6499297f9d74615adf8075378
-
SSDEEP
24576:Xb5uYoANOFkQdELilVmyUkc35/lcPheUdzoYTjPZTGIAiiXRuUNK4dcoQL4:XbYYLNcgbkoWvdcYqiouUNMoO4
Score10/10-
Disables taskbar notifications via registry modification
-
Sets file execution options in registry
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1