General
-
Target
49b2e2c622aed1aaccb8f17d500b7321
-
Size
2.6MB
-
Sample
240107-zcpkeseagq
-
MD5
49b2e2c622aed1aaccb8f17d500b7321
-
SHA1
a73b715a6ce39a6983c29765de0eef9156899ed3
-
SHA256
08ef1a2643f2d97ea39aa628a6a56a1109db245ae5c795278b4529d9e2f4a4c7
-
SHA512
0da166b392bcfe55c700a123414b03d706f5eb3c585e905f7db32b0db004f189c517f11ed343428ac92a9559538f05a2fb802fe5c0e210a8d233719c154c0328
-
SSDEEP
49152:9cUUQTLnKiVql9Bs8dKj+LFh2Hs7VcsxL2QlAQjLGi/9JNIzg6:mwHs9s8lLFxfCQ2QjLH9uJ
Static task
static1
Behavioral task
behavioral1
Sample
49b2e2c622aed1aaccb8f17d500b7321.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
49b2e2c622aed1aaccb8f17d500b7321.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
bitrat
1.38
jocker02.linkpc.net:1337
-
communication_password
81dc9bdb52d04dc20036dbd8313ed055
-
tor_process
tor
Targets
-
-
Target
49b2e2c622aed1aaccb8f17d500b7321
-
Size
2.6MB
-
MD5
49b2e2c622aed1aaccb8f17d500b7321
-
SHA1
a73b715a6ce39a6983c29765de0eef9156899ed3
-
SHA256
08ef1a2643f2d97ea39aa628a6a56a1109db245ae5c795278b4529d9e2f4a4c7
-
SHA512
0da166b392bcfe55c700a123414b03d706f5eb3c585e905f7db32b0db004f189c517f11ed343428ac92a9559538f05a2fb802fe5c0e210a8d233719c154c0328
-
SSDEEP
49152:9cUUQTLnKiVql9Bs8dKj+LFh2Hs7VcsxL2QlAQjLGi/9JNIzg6:mwHs9s8lLFxfCQ2QjLH9uJ
Score10/10-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-