General
-
Target
64c9c322a4d0b438be6032a41be2ac84
-
Size
89KB
-
Sample
231226-lry6hsadgn
-
MD5
64c9c322a4d0b438be6032a41be2ac84
-
SHA1
bc7ae6e81d762e4f7a3c861bc26f782100aaa1af
-
SHA256
0a3528f24b97f1c5fb2e87c0e3a63523cb5676367586825ef1aed3a53aaf2ecd
-
SHA512
6268d9d92ccc791bbb43f4ff9fdb2979289d8c400d99b44ee37a83e99783e67b005fdbe0ab8170705d62e128c92ca74557e21f13a9244c414435ce345851fcbb
-
SSDEEP
1536:Uvg1WKQmK74VzprUxe7kvLSPkIJNE9sq0Qs07tes/nqgxk5B3JxHKJISOuXsdQ5m:UvgEL7Yo4PkH9sIb8s/q6g3COHJ9bCMD
Static task
static1
Behavioral task
behavioral1
Sample
PHOTO-DEVOCHKA.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
PHOTO-DEVOCHKA.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
PHOTO-DEVOCHKA.exe
-
Size
180KB
-
MD5
b5bfc25ec5d0d2576975e6df14cee8f2
-
SHA1
ff48876248f0f0ff668aa7d67e2243bd9a3fd465
-
SHA256
e39b4d47bafb657aa37f821378b6140e21643173551f0c01adf8dbf4a3f0d748
-
SHA512
aaaafcad061f3ce56aeb0a636fb375dbb8eda5d34e4ce743037ff90ec00b3cd972bbf671881f0a3fb3ab9a03f0782944454f78eed2cf33c72aff2e758e52ce6f
-
SSDEEP
3072:fBAp5XhKpN4eOyVTGfhEClj8jTk+0hD+V64pfPFxI:ibXE9OiTGfhEClq9VzfPFa
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-