General
-
Target
0fe04be252ef427ce0eda2d563dcbb82
-
Size
2.4MB
-
Sample
231224-ywr9zsfhdk
-
MD5
0fe04be252ef427ce0eda2d563dcbb82
-
SHA1
53c03dc7ddd7be33ceb1d6e85e28fb59ae2b73fb
-
SHA256
608ed2cc7c1b992667b51f894df628e389520a1f447c790d8ef21e0cc75fa1e3
-
SHA512
60c120d38af734db23ea0072366e830e0d643ef51003ad71ac4e4687f6979feb6a8cc1542bffe3b2079e99b26ca4575be85912ab8f4d2a18eed5358a83891e12
-
SSDEEP
49152:MU3tlXIaVxQR1kDXWI68e2d9DXdUkRZYAAxug54kL3k98qs:Zj/TQ8GL8NddXukRKRugekYVs
Static task
static1
Behavioral task
behavioral1
Sample
0fe04be252ef427ce0eda2d563dcbb82.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0fe04be252ef427ce0eda2d563dcbb82.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
http://galaint.onlinesecstats.info/?0=103&1=7&2=1&3=68&4=i&5=7601&6=6&7=1&8=99600&9=1033&10=0&11=1111&12=psfdoyxtrk&14=1
Targets
-
-
Target
0fe04be252ef427ce0eda2d563dcbb82
-
Size
2.4MB
-
MD5
0fe04be252ef427ce0eda2d563dcbb82
-
SHA1
53c03dc7ddd7be33ceb1d6e85e28fb59ae2b73fb
-
SHA256
608ed2cc7c1b992667b51f894df628e389520a1f447c790d8ef21e0cc75fa1e3
-
SHA512
60c120d38af734db23ea0072366e830e0d643ef51003ad71ac4e4687f6979feb6a8cc1542bffe3b2079e99b26ca4575be85912ab8f4d2a18eed5358a83891e12
-
SSDEEP
49152:MU3tlXIaVxQR1kDXWI68e2d9DXdUkRZYAAxug54kL3k98qs:Zj/TQ8GL8NddXukRKRugekYVs
Score10/10-
Disables taskbar notifications via registry modification
-
Sets file execution options in registry
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1