General
-
Target
23c73d1191be94b802bc050cf816b1d3
-
Size
78KB
-
Sample
231225-ra17fagaa4
-
MD5
23c73d1191be94b802bc050cf816b1d3
-
SHA1
be9c1026d9f00785e97ae6621b051cebf13d07d3
-
SHA256
2a33cddd372b001c980b20a6b987cdd9e6395237896b364d23c4cc57b58fa993
-
SHA512
14872fe805a37625b4bda7b5f326099cafdc31a8cb1eb711b63f64416772cde09244e562e4e2e6d648f8a8e6132363c5cbe1d9d3a1368d6bcb5702ce129bf5b8
-
SSDEEP
1536:yQwfwimgTY23tG90wIsWfHlWKSd+QSqWU5FJ2hZ+cYS4BHKFJtBf9ntlsp0O3:ynoimg13tG90HdQ3Sqtlm+VSFJ/lntl+
Static task
static1
Behavioral task
behavioral1
Sample
PHOTO-DEVOCHKA.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
PHOTO-DEVOCHKA.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
PHOTO-DEVOCHKA.exe
-
Size
180KB
-
MD5
2e7d20079b41b69b3b16ecbd895be189
-
SHA1
c63b1f1a9ec96ca7b0fc0d92bc082593e1df85e0
-
SHA256
8aac418dfae104c626385ba620705f3d8f83ad9753020474a7fd41db3e808fc6
-
SHA512
ab1326e5b177a7d32f7d97c0d3efce235df0da4d2b2faf40528fe399e0adccb6e7c67c2aac07f15294be6c23f12b966c9fc3135d9b8f561e99f10a5ad98532e9
-
SSDEEP
3072:TBAp5XhKpN4eOyVTGfhEClj8jTk+0h6eXmUS:+bXE9OiTGfhEClq9deXY
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-