General
-
Target
10a331a12ca40f3293dfadfcecb8d071.bin
-
Size
359KB
-
Sample
240205-bd6y4afae7
-
MD5
fe0d508f5acb801e0854893d060ef504
-
SHA1
bd4e34e671f98b10aecbd853c89d68bc524c64d6
-
SHA256
5249a6c3b628626cb9c02b767a249b2422ebf3525ef6fadf668d2f68009c5baa
-
SHA512
2769824f29516423a3661b74e4a76e527b0ccb53c95ef0512e3c080523d1d5f2d4879e588df07cf6ea829133b0b1ca52f853189b741b46f0207b6cc5f89f62d9
-
SSDEEP
6144:4MT1NaLG6NQMYGhzAnYmqILzs8JZJZobZjaB63osAas3LNuWDezsu6vRF4acuI:sGozYGh0nYmqILzBCbZjlYsAa6fD3vvM
Static task
static1
Behavioral task
behavioral1
Sample
b58eec6e5aabc701404d5b5556c86fff5cc103c69eeda00061e838c4f122288f.exe
Resource
win7-20231129-en
Malware Config
Targets
-
-
Target
b58eec6e5aabc701404d5b5556c86fff5cc103c69eeda00061e838c4f122288f.exe
-
Size
421KB
-
MD5
10a331a12ca40f3293dfadfcecb8d071
-
SHA1
ada41586d1366cf76c9a652a219a0e0562cc41af
-
SHA256
b58eec6e5aabc701404d5b5556c86fff5cc103c69eeda00061e838c4f122288f
-
SHA512
1a5b8e77ddbab97bb4c848adbcd7dbfb9ca84307d1844dba9572fcea48a2cbb091a3fc52663b87568416adf18a1338adc07aab0bd5f1ab36a03c8ff8a035d399
-
SSDEEP
12288:jh1Fk70TnvjcL8o0S86aZ+ldnqA1W0PeF7H:5k70TrcJX32ih1Re7H
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-