General
-
Target
4dd4b9b27ab77cf5e6e4b774baa9cba2
-
Size
748KB
-
Sample
240109-kbzxfabfbm
-
MD5
4dd4b9b27ab77cf5e6e4b774baa9cba2
-
SHA1
3865a1b5105d28b8ff012253029a3f4a40aab2ac
-
SHA256
e50757dcc45f3d97c87c16c9fa322907d44f35c8b6e200302823018f63e3a185
-
SHA512
608d1d5260d56b9c803878dc699da45ed571201b2d55fb4807518a5b94e2369cf65ddd9b0b364af9fe2f053786e041d17f6c329f03abb7ac72b872920c2e78e9
-
SSDEEP
12288:AZ8szR7ChTq/MoeNGeVT5STAPKGPx0NVNBE8t0JfHkw6BE5qy2Bn8+gx7kxHI6je:ARlC5ueNPTSTAPKGPx0NVNBE8tSfHAB+
Static task
static1
Behavioral task
behavioral1
Sample
4dd4b9b27ab77cf5e6e4b774baa9cba2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4dd4b9b27ab77cf5e6e4b774baa9cba2.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
4dd4b9b27ab77cf5e6e4b774baa9cba2
-
Size
748KB
-
MD5
4dd4b9b27ab77cf5e6e4b774baa9cba2
-
SHA1
3865a1b5105d28b8ff012253029a3f4a40aab2ac
-
SHA256
e50757dcc45f3d97c87c16c9fa322907d44f35c8b6e200302823018f63e3a185
-
SHA512
608d1d5260d56b9c803878dc699da45ed571201b2d55fb4807518a5b94e2369cf65ddd9b0b364af9fe2f053786e041d17f6c329f03abb7ac72b872920c2e78e9
-
SSDEEP
12288:AZ8szR7ChTq/MoeNGeVT5STAPKGPx0NVNBE8t0JfHkw6BE5qy2Bn8+gx7kxHI6je:ARlC5ueNPTSTAPKGPx0NVNBE8tSfHAB+
Score10/10-
Modifies WinLogon for persistence
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-