General
-
Target
Русификатор от Tender.exe-20240219T185050Z-001.zip
-
Size
1.7MB
-
Sample
240219-xkdf1sba2w
-
MD5
70cc01afd2382ba5c41a2baa32f556e8
-
SHA1
346322fe5dc163149088208a34130c9030d38d3c
-
SHA256
b6701b408aeb00e373baa28be8ca7d1eb073ff15021c2dd2c85dfdffb9e4574b
-
SHA512
167a95887898f913808b03248e275b2d108dfc6b4f23f08a5775438c3a5bf26819a56d45ad303ba629920bf3354942c32d03b20d7f14b4f174b26ac9d575ff3f
-
SSDEEP
49152:uNOghta9A4xPN8x14r5B3Js6QbF2ftlgkK:cta9A4pN8xyNBk2ftWb
Static task
static1
Behavioral task
behavioral1
Sample
Русификатор от Tender.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Русификатор от Tender.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
Русификатор от Tender.exe
-
Size
3.5MB
-
MD5
be2056b6335f11fb674001812a31d6da
-
SHA1
850ad38764d8c5c704d71e07cffa226ee09b72c4
-
SHA256
d77467b2bb59904f96076c3ac47a0a897f22d44be0525675115b650ef7cdc673
-
SHA512
28bae0fb87d7a644e2d6c364f33e2a4d557935c4855e1e420c4cb93f28aeb005eb98c954d14d5b486c818f023f43ed7056e28975d892d16da853bd1c44010486
-
SSDEEP
98304:u35E+vGaiDnXGtwcmoQvoTn0iNYxbx0AUYnkPOY03BJ:8vGacofn0jbGYnkWxJ
Score7/10-
Loads dropped DLL
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-