General
-
Target
285066dc1a042f13353bfb6f70aafe54
-
Size
471KB
-
Sample
231225-sk786segcn
-
MD5
285066dc1a042f13353bfb6f70aafe54
-
SHA1
d51c00b573a8c1e4a6f688a41bc7d9c9ee606f18
-
SHA256
5c3be1eab91a7381b4d5cf46ce50b2509bd2c9016fc30285700cb3e7566677da
-
SHA512
31cea536b8f1c4b205dae4964d5fdb8f3b8d67f92c63d26a27b195c857c8f2abba33f111776edfe8e29b0e070d6507cd407d83642fa3666b3da72ca09af67844
-
SSDEEP
12288:vGHvS/cXhiEXTddLHSaEN02vggHujdBQzd8lnB:v2vS/wiEX/SFCgHwdmh8j
Static task
static1
Behavioral task
behavioral1
Sample
285066dc1a042f13353bfb6f70aafe54.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
285066dc1a042f13353bfb6f70aafe54.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
285066dc1a042f13353bfb6f70aafe54
-
Size
471KB
-
MD5
285066dc1a042f13353bfb6f70aafe54
-
SHA1
d51c00b573a8c1e4a6f688a41bc7d9c9ee606f18
-
SHA256
5c3be1eab91a7381b4d5cf46ce50b2509bd2c9016fc30285700cb3e7566677da
-
SHA512
31cea536b8f1c4b205dae4964d5fdb8f3b8d67f92c63d26a27b195c857c8f2abba33f111776edfe8e29b0e070d6507cd407d83642fa3666b3da72ca09af67844
-
SSDEEP
12288:vGHvS/cXhiEXTddLHSaEN02vggHujdBQzd8lnB:v2vS/wiEX/SFCgHwdmh8j
Score8/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-