General
-
Target
9334dbb61d19ac21c8f10bcda409a0d0
-
Size
2.0MB
-
Sample
240205-2rfbeabhcp
-
MD5
9334dbb61d19ac21c8f10bcda409a0d0
-
SHA1
0a6bab38061f1681bdc259690699ffc284970648
-
SHA256
0a662bd665b49469f488d81912ae84a7a2506e32a89390134cb0f934b4b57361
-
SHA512
140da6648af9606443db039a0e976fbe327495c665c64c6c35f617c8fcaf7d34e9becc1c3dcbdb5b377811d66959b5c407b749b136597529f406aebc712e2422
-
SSDEEP
49152:DgqdwTzUCSaogJDhTp7iK7VwgwV64rnB/FFc2ORZRO5b2BHzv:DPwTzX7JDhtFCgcrn5A2gRqb2Nzv
Static task
static1
Behavioral task
behavioral1
Sample
9334dbb61d19ac21c8f10bcda409a0d0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9334dbb61d19ac21c8f10bcda409a0d0.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
http://galaint.coolsecupdate.info/?0=154&1=1&2=1&3=38&4=i&5=7601&6=6&7=1&8=99600&9=1033&10=0&11=0000&12=ktlujvtfis&14=1
Targets
-
-
Target
9334dbb61d19ac21c8f10bcda409a0d0
-
Size
2.0MB
-
MD5
9334dbb61d19ac21c8f10bcda409a0d0
-
SHA1
0a6bab38061f1681bdc259690699ffc284970648
-
SHA256
0a662bd665b49469f488d81912ae84a7a2506e32a89390134cb0f934b4b57361
-
SHA512
140da6648af9606443db039a0e976fbe327495c665c64c6c35f617c8fcaf7d34e9becc1c3dcbdb5b377811d66959b5c407b749b136597529f406aebc712e2422
-
SSDEEP
49152:DgqdwTzUCSaogJDhTp7iK7VwgwV64rnB/FFc2ORZRO5b2BHzv:DPwTzX7JDhtFCgcrn5A2gRqb2Nzv
Score10/10-
Disables taskbar notifications via registry modification
-
Sets file execution options in registry
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1