General
-
Target
66c5dfd90dfac666e23668fe3f191e60
-
Size
131KB
-
Sample
231226-mcyrwaegc9
-
MD5
66c5dfd90dfac666e23668fe3f191e60
-
SHA1
d58ffbf5b55d2259db1aab95da5689898cf7d3d5
-
SHA256
7b862b913538342ff65893219a40e4d11344428e6c9fe317435d3ec19075d985
-
SHA512
d76692e022b6c812efd171b53e0b85254a764094d9cad0261b6b2a16c9e7dd947b9b2d0fb5be1086414d95c6c1b4da65ce568c4f90a9702e628f0ca604bbcd37
-
SSDEEP
3072:jnHXMpxcGxFyhQ0bOqYW6Qn6RuhCmICnACTIUAf9QnwhmHF:rHmGY/o0W6Q6R8CsnVTI4wh+F
Static task
static1
Behavioral task
behavioral1
Sample
PHOTO-DEVOCHKA.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
PHOTO-DEVOCHKA.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
PHOTO-DEVOCHKA.exe
-
Size
238KB
-
MD5
7710fc4fcea932679b40d31d409ae117
-
SHA1
bb5dfd38943356d6c1cff6b12d32f1cb54af6d35
-
SHA256
11abaf6a3b196588408e4d7fe8bf9a7d9b1a9b9bb3eeeb3dc2215be38f18eefa
-
SHA512
7fb1e792e8d2533a5aa4927971249d59f25fe2fe7067b9a1dbbb71aa1a5964bd7efb75822c73ffdef9ff118982e42b870c883229fa37eee228f3d11026574b06
-
SSDEEP
6144:MbXE9OiTGfhEClq9528TfdRoWRg+lN/JJUm:oU9XiuiJ8DRxl5
Score8/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-