General
-
Target
69211520423fa18fde09eee360343412
-
Size
6.5MB
-
Sample
240120-bs2b6aheh8
-
MD5
69211520423fa18fde09eee360343412
-
SHA1
dba822c016a18500e40723c7e96fa0894f025d06
-
SHA256
437ad80eaa637caba6237c5ecb0b4d328bb8131a45905088b2441bdfa021b598
-
SHA512
3378bc9725b187e9ed5be3f775c88153cfe49f053a1b1d5d0cee3d056289a4afd7ee1bbef86d8be8b7e497a244f143a29a983f8cf701f8e46338b9f23569ba97
-
SSDEEP
98304:Ld5VJppwXSyo8skn3moI25UzSOVRBKrCqflZ+VJscvKgFl8jD:LBpOwu2t26uqRsnf2VXvD6j
Static task
static1
Behavioral task
behavioral1
Sample
69211520423fa18fde09eee360343412.exe
Resource
win7-20231215-en
Malware Config
Extracted
bitrat
1.35
4napo6g3cp6av4hmxmwzi5lyojpfk3i2kl2tpssb2wvidqsa3kzo6eyd.onion:80
-
communication_password
e10adc3949ba59abbe56e057f20f883e
-
tor_process
windows32file
Targets
-
-
Target
69211520423fa18fde09eee360343412
-
Size
6.5MB
-
MD5
69211520423fa18fde09eee360343412
-
SHA1
dba822c016a18500e40723c7e96fa0894f025d06
-
SHA256
437ad80eaa637caba6237c5ecb0b4d328bb8131a45905088b2441bdfa021b598
-
SHA512
3378bc9725b187e9ed5be3f775c88153cfe49f053a1b1d5d0cee3d056289a4afd7ee1bbef86d8be8b7e497a244f143a29a983f8cf701f8e46338b9f23569ba97
-
SSDEEP
98304:Ld5VJppwXSyo8skn3moI25UzSOVRBKrCqflZ+VJscvKgFl8jD:LBpOwu2t26uqRsnf2VXvD6j
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-